Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2024 16:26

General

  • Target

    c10dd9b2ee67f64c79640f5fd94b29c7.exe

  • Size

    2.3MB

  • MD5

    c10dd9b2ee67f64c79640f5fd94b29c7

  • SHA1

    c8331ec4cc5a8699c5be3c47419bfcc2c1020a5d

  • SHA256

    e64fb683b947732b68d0172f08ab539e15ad9308db2eb9bb30157d1f8457bfdf

  • SHA512

    11b9f121218e9e1b0d2d3a47da39a22ff8f28f5cf8202821df2daa0fb1aff654eef404ac7c11ec326fe4a8ea2fabc3c7fdb38012bf61833db8af8cff5611a6e9

  • SSDEEP

    49152:pa60hoVEjaikTQwmG9p2TzOGZzh7aXRRg8PdvVqfz4nPnwk:g60hiKajdQzMXg8JVqfz4Pnwk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c10dd9b2ee67f64c79640f5fd94b29c7.exe
    "C:\Users\Admin\AppData\Local\Temp\c10dd9b2ee67f64c79640f5fd94b29c7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\is-IGM7F.tmp\c10dd9b2ee67f64c79640f5fd94b29c7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IGM7F.tmp\c10dd9b2ee67f64c79640f5fd94b29c7.tmp" /SL5="$C0090,2121636,132096,C:\Users\Admin\AppData\Local\Temp\c10dd9b2ee67f64c79640f5fd94b29c7.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1928
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4404 --field-trial-handle=2264,i,7010714054498059916,1862725710331979271,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1784

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-IGM7F.tmp\c10dd9b2ee67f64c79640f5fd94b29c7.tmp

      Filesize

      764KB

      MD5

      a328e3402f2e3b9d8998200023035f28

      SHA1

      660e9eec0f13ec5fc161a095b0560e81453416a2

      SHA256

      986dc7df2ef31dae0878479d75914f180378af1ee89efd6e652c4906b880f91e

      SHA512

      8b5ff4bfdaeb7351756e90fda666987d80f61811357fae458a5000481a2dbc7d98561e3d80047a86b33562f1a456ef536327e75030da48bab0479dbf04bea8a8

    • C:\Users\Admin\AppData\Local\Temp\is-P8MP8.tmp\FileDe.dll

      Filesize

      64KB

      MD5

      857ec63122882ec4032c63a7a152259b

      SHA1

      f24d57e883c0e1513150f26064d080285b6efc87

      SHA256

      cd7f6bd397460662ac66fcdadaea7e68f5de8140aea956e619a7bcf1ef4336d3

      SHA512

      bc1fbde5f03ee44fab7fb734a1e33860c095618e9247c3bda281af1d467c2a3f167c06f4a852b87bbe7022ceed698f97f63b55eb160e9310a14d842caf4d5019

    • C:\Users\Admin\AppData\Local\Temp\is-P8MP8.tmp\FileDe.dll

      Filesize

      385KB

      MD5

      10bb1bda06871deb8d0506b4f6390b6c

      SHA1

      ac96f51cb1f1d9e341eca88b47a734bfb1e3f494

      SHA256

      0124f82f392a3156edc5380f28ac19caecc89682a7556f28a2172681d923ac84

      SHA512

      01afabb1f5458bf928787c69b4078f5ba738ff427989aa6a3775c8bac659f98b81e4c4acccaf093815afea7bad37bda0cfb07c088bac4eda2fdf149003e3aa62

    • C:\Users\Admin\AppData\Local\Temp\is-P8MP8.tmp\itdownload.dll

      Filesize

      200KB

      MD5

      d82a429efd885ca0f324dd92afb6b7b8

      SHA1

      86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

      SHA256

      b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

      SHA512

      5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

    • memory/436-30-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/436-2-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/436-0-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1928-17-0x0000000003280000-0x00000000032BC000-memory.dmp

      Filesize

      240KB

    • memory/1928-7-0x0000000002250000-0x0000000002251000-memory.dmp

      Filesize

      4KB

    • memory/1928-24-0x0000000003400000-0x0000000003466000-memory.dmp

      Filesize

      408KB

    • memory/1928-31-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/1928-32-0x0000000003280000-0x00000000032BC000-memory.dmp

      Filesize

      240KB

    • memory/1928-33-0x0000000003400000-0x0000000003466000-memory.dmp

      Filesize

      408KB

    • memory/1928-38-0x0000000002250000-0x0000000002251000-memory.dmp

      Filesize

      4KB