Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 00:20

General

  • Target

    8d36999a559c88874f5276eba9d19b6bc31a9799ca912661bd49be23f1319f28.exe

  • Size

    73KB

  • MD5

    7f85865bb794743dea08995bbb5c3733

  • SHA1

    2e931594ac0bbe55242ffd8c2bbe462eeb3529a4

  • SHA256

    8d36999a559c88874f5276eba9d19b6bc31a9799ca912661bd49be23f1319f28

  • SHA512

    abd19ce7d8431761e978f256e391c6b93515c9af4e68a145c091f30bf48bbdd7718eaa758a12a5ccd602a203be229b4ae8ea2d17bb36bd90b2568439d51c4687

  • SSDEEP

    1536:hbkyXiuRUK5QPqfhVWbdsmA+RjPFLC+e5hVl0ZGUGf2g:h3iuRUNPqfcxA+HFshbOg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d36999a559c88874f5276eba9d19b6bc31a9799ca912661bd49be23f1319f28.exe
    "C:\Users\Admin\AppData\Local\Temp\8d36999a559c88874f5276eba9d19b6bc31a9799ca912661bd49be23f1319f28.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c [email protected]
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Users\Admin\AppData\Local\Temp\[email protected]
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 00.exe
          4⤵
            PID:496

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\[email protected]

            Filesize

            73KB

            MD5

            201f7b9bac2b9e712eaab820fc379ce1

            SHA1

            9cf7acacb7f5525252537fdaa6c2540f61e755c8

            SHA256

            81d71a247d7e4933a94fbf361ea12ccecd00f9ecd0d407cd46c9159f5fdbae82

            SHA512

            67a9a1cbbca27c8a49614283cc5181c1be1a5058f65876de2ae3439e1dbcc9d9524e9f572dcc404af14c72ecab5ef4f5d094160d41ad4145a45858ae555abfb2

          • C:\Users\Admin\AppData\Local\Temp\00.exe

            Filesize

            2KB

            MD5

            7b621943a35e7f39cf89f50cc48d7b94

            SHA1

            2858a28cf60f38025fffcd0ba2ecfec8511c197d

            SHA256

            bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991

            SHA512

            4169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1

          • memory/3124-7-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB

          • memory/3624-8-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB