Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 00:57

General

  • Target

    d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe

  • Size

    79KB

  • MD5

    621b230cc625b651f3e854399b25ace6

  • SHA1

    a2dc0ead824fdd894cb4326908cb2d74b7df51d5

  • SHA256

    d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f

  • SHA512

    2e3efa4597837ad4fa65cb3943f7f2e5f5943d3529f3849f95ec11b28548a385f8d6c9060f999af37ebdd8b531636aec23a26b785da7f95d59601caf87da498d

  • SSDEEP

    1536:zvQFxWrhuqoWnMxOQA8AkqUhMb2nuy5wgIP0CSJ+5yAB8GMGlZ5G:zvQFx/0MAGdqU7uy5w9WMyAN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3756
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3472 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\[email protected]

      Filesize

      79KB

      MD5

      20f729bcad3f1c104221dc0088c2c604

      SHA1

      a5355620f7e85c976fdbdbbec0df853e5f72012e

      SHA256

      cd5c0f83d2a809ce1ad3a093f4f532bcb465d94fc3608f417762bccb999cf985

      SHA512

      0aa327dd74278d5190b0fea91a358bb474b15c6c6c43b36453829c29c000d90d23ed15fdf6c9a0b4b9686d51127ea52afc27429810c4de4dc7020e8020f843ac

    • memory/2088-5-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3756-6-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB