Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 08:47

General

  • Target

    e14369c7d679e6578635020624468c98.exe

  • Size

    1.9MB

  • MD5

    e14369c7d679e6578635020624468c98

  • SHA1

    a0a83b99e0669ae935100ad55315b67e68842b71

  • SHA256

    615d453611e92a205875ed431633a96104537e3b1b50a7d8e897d1e5dd04191d

  • SHA512

    4947647a620c23d08d0ac884c819aadf183bcfc7a071e924b95adb6948a15fce252565279963548f9acb27a8020d0be6699258c61cc8a0cc4127e509e82cf259

  • SSDEEP

    49152:Qoa1taC070dv8jhUnFvAElY0SFCnBDsEr+:Qoa1taC0RNu42Yt056

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe
    "C:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\145E.tmp
      "C:\Users\Admin\AppData\Local\Temp\145E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe C83B3B3FFABF8671EC05616A5EB9EE9CA8B90C484325FD43E8FED897F7390F2F140C059F5F3C11844DAD2EE55998277E5299ECA7296F3B1E2387DA7CFF128D82
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:5912
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\145E.tmp

      Filesize

      1.9MB

      MD5

      4df55649a84cb9f34dae23f6d2bbe13e

      SHA1

      07ce566ea22680e42caafb243e732284a416fa17

      SHA256

      3abbb6d35a13eee834dabeae85a8ee8b371d9f2420650829aa0b6f3b3b2bdbca

      SHA512

      5702984d8b4a68f34a7464f0bf36e08795dee1db69bfe8cab86ab3b621d55d60be0b6e95741c8a680904e708cfdbcf000a82a7260d2f6f4aeb4886bd7030e3e6

    • memory/972-0-0x0000000000400000-0x00000000005E6000-memory.dmp

      Filesize

      1.9MB

    • memory/5912-5-0x0000000000400000-0x00000000005E6000-memory.dmp

      Filesize

      1.9MB