Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:53

General

  • Target

    7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.exe

  • Size

    1.7MB

  • MD5

    e1ea7c2615b96820e451647c62afe24a

  • SHA1

    3e1726a487fa3ab4f927917273f96198d19def0a

  • SHA256

    7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a

  • SHA512

    9c8123d78e2368db4d3defb93286123f3730e6e68fd059ac5a2c4be499b4751e63cc3218d87ebe6d957d95e4e05cf4f4791e8036903f333c232f7d3d3e158f1d

  • SSDEEP

    24576:s7FUDowAyrTVE3U5F/WGqKmyKic6QL3E2vVsjECUAQT45deRV9Re:sBuZrEU7IyKIy029s4C1eH9I

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.exe
    "C:\Users\Admin\AppData\Local\Temp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\is-2R8FD.tmp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2R8FD.tmp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.tmp" /SL5="$B0066,922170,832512,C:\Users\Admin\AppData\Local\Temp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2R8FD.tmp\7ed6c24c96cba2434f7470d3664f1f466c62f5033a5fff9025b7ee89d82c710a.tmp
    Filesize

    3.1MB

    MD5

    a702fcd9ec21f263f0e558ad2ec22acb

    SHA1

    3dbfd30cafda1d1961802ecbec619d6c1a302e04

    SHA256

    5a87cad3534e6eb8367a58e569f7ce4e92995e739e01fcd0e2e8f97ddb05c9de

    SHA512

    627aadeeb9710882807a6093a2b8390e5d4f6793fa13f4ac2231f4fe5fd707facb71f0ef9c7617f5d9d3ff90993c9c8bb2020f1b96b1bca94dd56626d636587a

  • C:\Users\Admin\AppData\Local\Temp\is-T4I2P.tmp\idp.dll
    Filesize

    232KB

    MD5

    55c310c0319260d798757557ab3bf636

    SHA1

    0892eb7ed31d8bb20a56c6835990749011a2d8de

    SHA256

    54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

    SHA512

    e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

  • memory/2700-2-0x0000000000401000-0x00000000004B7000-memory.dmp
    Filesize

    728KB

  • memory/2700-0-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/2700-12-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/4684-6-0x0000000000400000-0x000000000071C000-memory.dmp
    Filesize

    3.1MB

  • memory/4684-13-0x0000000000400000-0x000000000071C000-memory.dmp
    Filesize

    3.1MB