Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 16:13

General

  • Target

    bc3d561ce6d544e13fc9570980b03360.exe

  • Size

    1.7MB

  • MD5

    bc3d561ce6d544e13fc9570980b03360

  • SHA1

    68a9711402e07b5347af6f6e2d103a201281356b

  • SHA256

    cfc606a0d46c31631bb01699ef0a28f2f58cc2d7badd7a282f39cd1c27620a40

  • SHA512

    2993eb5f7cf191ee3f7883980afe019cc085889febb72d426841ccd460a6a2af5b01630d19c3d80cefabd3e79b3b46451036b523a45e736b39ea988455b6480b

  • SSDEEP

    24576:t4nXubIQGyxbPV0db26WU7qKnusv1Et9uGpckT52zedlq89Ws5uIzk5aM/phdOH:tqe3f6V5fSffPMWrQ0Zky

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe
    "C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\is-A3BRJ.tmp\bc3d561ce6d544e13fc9570980b03360.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-A3BRJ.tmp\bc3d561ce6d544e13fc9570980b03360.tmp" /SL5="$50062,921114,831488,C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-A3BRJ.tmp\bc3d561ce6d544e13fc9570980b03360.tmp

    Filesize

    3.0MB

    MD5

    38e9177040663abdf7cb42d237b03d9d

    SHA1

    0b95b3694406d9d86aa3e4953f42d471977ff03d

    SHA256

    2a322dbda4ac86aed04ab99f9f2c277c2f84b6046e234c3ae55ceec53883b594

    SHA512

    78db4c72b2e10d665775e7f306d926060c95ba47610e809e0a21006280f9f0280fa572168b9c9ee00e2121090db9a20dc524677d961fea4292c41c44ba3cb30f

  • C:\Users\Admin\AppData\Local\Temp\is-Q6VVA.tmp\idp.dll

    Filesize

    232KB

    MD5

    55c310c0319260d798757557ab3bf636

    SHA1

    0892eb7ed31d8bb20a56c6835990749011a2d8de

    SHA256

    54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

    SHA512

    e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

  • memory/2036-6-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/2036-13-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/2036-16-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/4248-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4248-2-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4248-12-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB