Analysis

  • max time kernel
    158s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2024 20:19

General

  • Target

    5ae6a7fce89fa106d758a62978024b2119973c7d547f7e2464b79a1f75ac74ad.exe

  • Size

    256KB

  • MD5

    da879402f6db7fb628802c0df277c30d

  • SHA1

    1649bdaf4059410782dad8a17b7acfa9efeb31d6

  • SHA256

    5ae6a7fce89fa106d758a62978024b2119973c7d547f7e2464b79a1f75ac74ad

  • SHA512

    57e4b33dd66b210499d0f242ea136260eafae9fd652b2b204e0f03e1669793e6b76b44b5f195805a30a68ff7481ece5c483971062fb0416f1d22d0e675c4e050

  • SSDEEP

    1536:Je58ljKHqIK8lg+b/kStvu5ldUeF/sXc:S8EKi1u5ldp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ae6a7fce89fa106d758a62978024b2119973c7d547f7e2464b79a1f75ac74ad.exe
    "C:\Users\Admin\AppData\Local\Temp\5ae6a7fce89fa106d758a62978024b2119973c7d547f7e2464b79a1f75ac74ad.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\SetupTopomap.exe
      C:\Users\Admin\AppData\Local\Temp\SetupTopomap.exe /RESTART
      2⤵
      • Executes dropped EXE
      PID:4828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SetupTopomap.exe

    Filesize

    256KB

    MD5

    da879402f6db7fb628802c0df277c30d

    SHA1

    1649bdaf4059410782dad8a17b7acfa9efeb31d6

    SHA256

    5ae6a7fce89fa106d758a62978024b2119973c7d547f7e2464b79a1f75ac74ad

    SHA512

    57e4b33dd66b210499d0f242ea136260eafae9fd652b2b204e0f03e1669793e6b76b44b5f195805a30a68ff7481ece5c483971062fb0416f1d22d0e675c4e050