Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 00:09

General

  • Target

    cpu-z_2.09-en.exe

  • Size

    2.1MB

  • MD5

    f1ce59f81de106aa0ca4672e5971c6f2

  • SHA1

    21d9ca7a12479a0ec2af4f1c567489a1192b7a21

  • SHA256

    657b7f4e403269768cd20f1a5b481878cecc775522ceef119b2723e0844f2361

  • SHA512

    0e77a515b35ee33a9d7e887f1e8bf0b243d0b2a5168c471b2b66c5345b31b690bca81bd392f086b129070db68fe7d3d79647fe07f2657ebc6fdf8acaa8677a71

  • SSDEEP

    49152:5ycMB7U8FZ5HJrEJuqZfvLmDBjovzNdqO2qdbtAKolp:kcOUctouKfvLmljovzyUtfolp

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cpu-z_2.09-en.exe
    "C:\Users\Admin\AppData\Local\Temp\cpu-z_2.09-en.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\is-TOOB5.tmp\cpu-z_2.09-en.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-TOOB5.tmp\cpu-z_2.09-en.tmp" /SL5="$7005E,1966792,58368,C:\Users\Admin\AppData\Local\Temp\cpu-z_2.09-en.exe"
      2⤵
      • Executes dropped EXE
      PID:4128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-TOOB5.tmp\cpu-z_2.09-en.tmp
    Filesize

    723KB

    MD5

    77b6d18b219d145c73f779d0d82f6bd0

    SHA1

    485d5eda874bd28898b5abfbe36944616aafc0f0

    SHA256

    aab8b17924b8f250d1ca477fa705d342bf620ff5864ebbc0b5e5d177c43a1743

    SHA512

    5164338c98eb1f5cb831ac8a02a62c278d331c9e3c649d27a0141611de85957bde38cffbcb8a816bb05d207d8632c4000cff40b2ce8880aae8cbe38dcb296163

  • memory/2916-0-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/2916-2-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/2916-8-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/4128-6-0x0000000000660000-0x0000000000661000-memory.dmp
    Filesize

    4KB

  • memory/4128-9-0x0000000000400000-0x00000000004BF000-memory.dmp
    Filesize

    764KB

  • memory/4128-12-0x0000000000660000-0x0000000000661000-memory.dmp
    Filesize

    4KB