Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:30

General

  • Target

    7c692ab209fff28f422559debc2bbb2d0a4f1388e0d5b302a7e1fd1e07d1e75c.exe

  • Size

    79KB

  • MD5

    039d66a647621e960ae7ad080268e8d7

  • SHA1

    2670f76737bf744ddc777df9507a239940e8d2bd

  • SHA256

    7c692ab209fff28f422559debc2bbb2d0a4f1388e0d5b302a7e1fd1e07d1e75c

  • SHA512

    67d0caeb082a269fb8a2847eb08ac2303d0c472158a9a5970c542abb325965d655448da24d7a4a8f1f192c44756f60c10746346a5a7c1a31796c2bdd61468e6e

  • SSDEEP

    1536:zvOjaGdq/bOXbIv3YOQA8AkqUhMb2nuy5wgIP0CSJ+5ySB8GMGlZ5G:zvOjapaYGdqU7uy5w9WMySN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c692ab209fff28f422559debc2bbb2d0a4f1388e0d5b302a7e1fd1e07d1e75c.exe
    "C:\Users\Admin\AppData\Local\Temp\7c692ab209fff28f422559debc2bbb2d0a4f1388e0d5b302a7e1fd1e07d1e75c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    f57924993184bcebbede434e1217fab6

    SHA1

    245dea44d41fd6566f15bf6b56769a7adf6a60e8

    SHA256

    b632aea5aa18a5593844daef72512099d7d350891717d07337d2ff496486edff

    SHA512

    6ce9472c581afe8b5b56cbfdeb83184be9804a01283fff0577913b775306d49ca317569e1490d4c39211edc3de037663fbe506242567153b1d6c624a6cf27456

  • memory/2572-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3664-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB