Analysis

  • max time kernel
    133s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:00

General

  • Target

    88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe

  • Size

    79KB

  • MD5

    1f8826fb47780d2d8726804fb8668331

  • SHA1

    88d33f0e6a89a4d4e5f498a1e393d7e661b812e8

  • SHA256

    88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0

  • SHA512

    835016a2d5b2c67a76be9460c94b720bf211219381e3e5e5ee691ca59704363416c1b9e75b058696e4dae51eadbaf01137a80f691e75f2505188a8137871e320

  • SSDEEP

    1536:zvDsG4JxfZRe6RIFnzUmJfOQA8AkqUhMb2nuy5wgIP0CSJ+5yZB8GMGlZ5G:zvYc5zpJWGdqU7uy5w9WMyZN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe
    "C:\Users\Admin\AppData\Local\Temp\88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    c5955db7f63d0303189aaed6a600ded8

    SHA1

    e63f87e38a092da1b4481adc37ca654e26568abb

    SHA256

    80de5f2d32968698d693ab432faf36100360d4dbe5ddfe4274cd0077dc4279c6

    SHA512

    147de7fcc1be8ca59e4a883bc81dfae9da0d14ac934c5d35e2feb0de80928f56fccaaef8a32fb4169dc21b35131fbd497aa0758a1ad5a37c8f0660a18b644334

  • memory/212-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2780-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB