Analysis

  • max time kernel
    133s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 05:08

General

  • Target

    fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe

  • Size

    943KB

  • MD5

    a1e03626aa75f284be909682173d5ed2

  • SHA1

    9c4e6791c9e2431d6157995d14e5070802e26562

  • SHA256

    fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7

  • SHA512

    f5a5e949f10aaa84e342b3b0c92696ccd14ff6aa2797785cfa82274a14b68e0a6b5964956397842250ebb0070c4da5ca2c71f1d55959d28eb7e2b3129024bd72

  • SSDEEP

    24576:GaO+454MwkCRzAH0xw8yK7qKQZLZmP1VUZm1+8S4xQnw:GaO+q4M1CRMIw8yK7C1ZmNiZm1+8S4xT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe
    "C:\Users\Admin\AppData\Local\Temp\fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\516C.tmp
      "C:\Users\Admin\AppData\Local\Temp\516C.tmp"
      2⤵
      • Executes dropped EXE
      PID:4412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\516C.tmp

    Filesize

    943KB

    MD5

    af80439b50ca5c1b189c01fd9c5451ce

    SHA1

    91749f407870d4e4f98f23fed6911958e92a3849

    SHA256

    0a02a0e503875056dbe61928ba9a0c0b5ffb64830cc1650046c85b21da083378

    SHA512

    7dcb317a97fa1df624de65f0bfb351db39eab3ad621b6d9406e0322ff0592f3cb503986e5bf92e9a641701b40fefa4c056e8ba35a1d8dddd03f8d8eb6dd65f32