Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:00

General

  • Target

    c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe

  • Size

    1.9MB

  • MD5

    c2d80eae476141d452c035d209f35388

  • SHA1

    cdead61eff83fcc5a02f00c942af3e4eb0126cca

  • SHA256

    c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937

  • SHA512

    cc8769e4c021b013501b38c8c019f09eda6370735dc90f3420f89095bd1fe1060a5c2ee5bc11ac2ea09d93264cf3bbde94005ed6d88283d877f3cb27b795c201

  • SSDEEP

    49152:IBuZrEUU5b4+eBTfSd4Ywl4WAmYWbqgMm:2kLU5buT6d9y426tm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe
    "C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp" /SL5="$901D8,1084674,780800,C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe"
      2⤵
      • Executes dropped EXE
      PID:1420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp

    Filesize

    3.0MB

    MD5

    e80bc2b14197bcb114d3375177282068

    SHA1

    a2fc9903fe663369ef20382a1ff86ab00c5b616a

    SHA256

    e4ed2f7d723773fc988a973add360cfca7915b02f657c674da0f20c0185b51ca

    SHA512

    8328f5b790d9a9e66ef2b746ee03706809de2410d7ca1ec68661e2f066d3d30a0a3f20e0b7d5c23772a6f0faea6d372375eeac789864cb46be05b796646567ee

  • memory/1420-6-0x0000000000400000-0x0000000000708000-memory.dmp

    Filesize

    3.0MB

  • memory/1420-9-0x0000000000400000-0x0000000000708000-memory.dmp

    Filesize

    3.0MB

  • memory/1532-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1532-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/1532-8-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB