Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 01:56

General

  • Target

    682a2ea9a570e20ead208293725ff2b0.exe

  • Size

    955KB

  • MD5

    682a2ea9a570e20ead208293725ff2b0

  • SHA1

    1767b9747ea7df2b36c3f30da6f74ab0e01a36e5

  • SHA256

    2c1ff8a86c36f584fdad32eb22e205892227753f4a08c355fe55ba55bfa11b59

  • SHA512

    7b924d921cea64dfd118dc59da06705145760168724953545100fdd820fe7c3df0161e33a1a7ffa3a507f6f55ad0853b5769671592425de327d00556e04307ec

  • SSDEEP

    24576:oTEKr+lQNNVOUN5mKnkHz2agLZmX1+RnM3L2N9Y3G3wSK6JE4t6FGerrthf:oTEKr+q4o5iHaasZmF+RnM3L2N9YWgSO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe
    "C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\37B9.tmp
      "C:\Users\Admin\AppData\Local\Temp\37B9.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3136

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\37B9.tmp

    Filesize

    955KB

    MD5

    736a1b3e5a7b3d57f2fb554c36f6d3a6

    SHA1

    88f91d6c25f7d5a59193a045df84881e0517e6aa

    SHA256

    7a399892c98f03e97edfaa225fa9127e89dffafc48ab413dbd9bb80644befdc8

    SHA512

    481beb9ef010b54a8cc3fbbfbb6d1c459694b0072df7af93d1e009ad3330ed8f2b3cdc912c51ea2b747a715a3820906c66e227d6a9480b4e40631b88484dfb2a