Analysis

  • max time kernel
    132s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:41

General

  • Target

    80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe

  • Size

    7.8MB

  • MD5

    f38651573d5bd7795ed082e618b12b4a

  • SHA1

    86629d876002950ec0a6e615b07b4340cdc9f4df

  • SHA256

    80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f

  • SHA512

    797dfba42bb8acab9fe01551ab5ddae962f50e3993b01e7e242c93447e22ede71964814851950b47c934d4bca76a997804f1d24bbc2d7e91266f63c4fb6645eb

  • SSDEEP

    98304:emhd1Uryeu0vr8Sv7zfJgV7wQqZUha5jtSyZIUb:elO6gSJg2QbaZtli

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe
    "C:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\7CA2.tmp
      "C:\Users\Admin\AppData\Local\Temp\7CA2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe 68B4AB225EF0A653899DF57F6E68AB46B9C3B550B89E94E8610D64A358A6C1CD92E828D59FC983F5009A8A1DC79C85EC28B81C4CD615148714766414FBDF5EEC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7CA2.tmp

    Filesize

    7.8MB

    MD5

    1876ad1f417d2e49df396f7aa1b9821c

    SHA1

    23646edd57679d17b27963737c74c81e63a3b262

    SHA256

    07f2146ded00f20966db72ca1ad893d1c6ce521258bbf94f3cb119822ea995e6

    SHA512

    d23d2fcde19a6181ad0be44629cfa06dda3498c7cd87a0b5256634fcd12c99e961093e62479b91a3945fa9546b1e30e9d6d2440fba148f4dede2cc943eb53a0e

  • memory/1128-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3752-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB