Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 05:28

General

  • Target

    e7e5671650d2d40fc31719edaae7dad63d6db32dc6464f1a039c010e07e9fc16.exe

  • Size

    79KB

  • MD5

    0fa3215949335e877eb76af4ff239b37

  • SHA1

    14b98db94e65de204d6dcb99a15992856f86e8ba

  • SHA256

    e7e5671650d2d40fc31719edaae7dad63d6db32dc6464f1a039c010e07e9fc16

  • SHA512

    d313ab96d4a6dfb3c9ba38fc1e12f107fa1306f22c4f4fc8c68c07b8ee9130f1090d353f1ae1c252cdc6913e672f5dabc6009e691e3b61b9e6b610b50cad0600

  • SSDEEP

    1536:zv1FbW6fkOQA8AkqUhMb2nuy5wgIP0CSJ+5y0B8GMGlZ5G:zvrW6fBGdqU7uy5w9WMy0N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7e5671650d2d40fc31719edaae7dad63d6db32dc6464f1a039c010e07e9fc16.exe
    "C:\Users\Admin\AppData\Local\Temp\e7e5671650d2d40fc31719edaae7dad63d6db32dc6464f1a039c010e07e9fc16.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    05285fff1bf7921a22e85bc9b545a240

    SHA1

    164dd10b816bd47e219332f07def00c62691f89a

    SHA256

    c4304a67cff3f6e4a4b119aa23b92d51608fb0969c8ce09dbb2a43554a1e7419

    SHA512

    ea5704ed03ff5f593875b33713d2af4cd1db9966296610203d3fa99633c1e7b29c1569d75f3a12f813872c1b4248233505b3a6b6f446e25f2795d2a734813005

  • memory/1524-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4184-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB