Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:18

General

  • Target

    d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe

  • Size

    398KB

  • MD5

    08e1645bc9a8eae739f244b825bfe1ce

  • SHA1

    e66004d3e1cfa6522d69501c568619f42188102d

  • SHA256

    d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8

  • SHA512

    b4c686911c46f84210917a3fd3dbce0497cc9c113110e6e60e8dcc244dfa703c14d1bb5cf17d86244edfc19bf2e85d0cf34cfae0ffd112c0ae430cafb89dc754

  • SSDEEP

    12288:CMrry90dBJ/gL9NbUPqkDEkbu9Ct5rRhJnak9w:hy4BJIR9UCkgJQzP9w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe
    "C:\Users\Admin\AppData\Local\Temp\d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1CH74eP5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1CH74eP5.exe
      2⤵
      • Executes dropped EXE
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1CH74eP5.exe

    Filesize

    320KB

    MD5

    fc8f6d44961dc0120b8d064cda4758b6

    SHA1

    ea03a5c9537cc11a330cfe7341c5f08afd90b193

    SHA256

    0bbee931bf2eece0773b860ae59292978476b184e5cd2c4b44527d4691f7bf5f

    SHA512

    50fdb30cc6345b07039c6971d956f94c723119b247f4e2b9a432933bbd81b87f26c6c025f0afb16aa1c3440dd51ba79710d98bb11e7151ac5085ad05760bf9e1