Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 13:18

General

  • Target

    d636ad5b80658c9873895c1622093f5e.exe

  • Size

    1.9MB

  • MD5

    d636ad5b80658c9873895c1622093f5e

  • SHA1

    844c96a3e0bd7a366361fb64e69aabde00eb9d52

  • SHA256

    8d663b4419b2be242547bc070c2b4bd6b08f5e8cbaa212497be2cdaf7c308d41

  • SHA512

    3a643ff0db5b51b4210cf464c12c18af9f1933edeb745e9f1fac9d8a8094ffb882d5fd94e0f457e5e63134ca6eb61d7108d9bfd172587154a754a6c3d9d39729

  • SSDEEP

    49152:Qoa1taC070dQ69KMnhwlxtUSydEI20v35W:Qoa1taC0C9KUelxGTda

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\4AF3.tmp
      "C:\Users\Admin\AppData\Local\Temp\4AF3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe 5D8713072D44E043BF1FB457E979563BC789C0CCAC1421502BF63D89BC783E7A8D40A2F31301E46F4A909141307189425647417F3D1EA0EC70667CA30DF39CD3
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4968

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\4AF3.tmp

          Filesize

          1.9MB

          MD5

          b04caac266d44aae4176a5ba3deeaec8

          SHA1

          e1d01a526bc3e5a1a67520f434c8bf8de8b907fc

          SHA256

          e5e08e3d02558eb118170071f64b95e72a1b66d5d8f09ab5e59ff923369c17de

          SHA512

          8bc7bb5df20886723352701dd09067145e0bbf433eac05ab34773cb0ee9397b0d89a25dfac3eae3d5650f96653bd51476483e9b4374e890c85d5b23404316c20

        • memory/1596-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/4968-5-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB