Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:58

General

  • Target

    15d1921b1ea110af1256796d3eef425eb85fb4c3c22f227f8c21d696da043bdb.exe

  • Size

    4.8MB

  • MD5

    dac19129cc9435750fb96fecd0d0e512

  • SHA1

    5ac3ad6f2d85be300e026503a70b2849d0d0733a

  • SHA256

    15d1921b1ea110af1256796d3eef425eb85fb4c3c22f227f8c21d696da043bdb

  • SHA512

    0a6d3ece5e4592c269c3e43e7f94cd001aeca82112b4eef730e9a99093f26d11c37e67df22ba763b99663b127abe9deb227021a347024b144dafa28edc1666dd

  • SSDEEP

    98304:emhd1UryeNgl6DgMD3klBV7wQqZUha5jtSyR:elvpD072QbaZtlR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15d1921b1ea110af1256796d3eef425eb85fb4c3c22f227f8c21d696da043bdb.exe
    "C:\Users\Admin\AppData\Local\Temp\15d1921b1ea110af1256796d3eef425eb85fb4c3c22f227f8c21d696da043bdb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\33F1.tmp
      "C:\Users\Admin\AppData\Local\Temp\33F1.tmp" --splashC:\Users\Admin\AppData\Local\Temp\15d1921b1ea110af1256796d3eef425eb85fb4c3c22f227f8c21d696da043bdb.exe 3FA0EAAE0C5D590F35E9FD2AE6EDB264FC45DE3C3A7F907C1C3A8262EB466E3D34D9C4A67D2649572D18381B9E86787BC16DE5E8FEF21EC4F7B393A529D3BC95
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\33F1.tmp

    Filesize

    4.8MB

    MD5

    f3aace5f330bb3b53cea674806509c47

    SHA1

    111eb43467701e93fd95a8d0b596ea62e7bbc744

    SHA256

    f7e7be476680aef4e46b91ba78c99f1b18b75ea7e01d712ddbd3255499e76a3a

    SHA512

    62c55459461e8c9e0e8f63a3e59f2c9a5ade546fca0e48643bae2c6fe9685920eca2c75d6f250154a0bb38290b932dc19b050493582cd95fd937a9dbb88c2267

  • memory/2032-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3944-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB