Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 07:47

General

  • Target

    SysTweak Regclean Pro 6.21.65.1986/sysrc_trial.exe

  • Size

    3.4MB

  • MD5

    81d4abea621ab14bb3feecf57fe62af6

  • SHA1

    90978812ba12edea588b4a655de30c287e5ea4da

  • SHA256

    c5bf81367d12dbe5a59b45b8178d9944ce91a570eb1ed9c5524a5d68cc2cf03d

  • SHA512

    166777c1279f72ef31f51e42c57d968d9f745efbe8a91f11faf009a4141195665499470cab3b1a0156a830fba07dcedecbb516dde4f2fb3ae8759334b7cf6dd7

  • SSDEEP

    98304:nkvsxw9Nz0pdtwprgRzZr8dl4menoAKW03C11jxIo:n6IZwprwxGxenovC1T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SysTweak Regclean Pro 6.21.65.1986\sysrc_trial.exe
    "C:\Users\Admin\AppData\Local\Temp\SysTweak Regclean Pro 6.21.65.1986\sysrc_trial.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Users\Admin\AppData\Local\Temp\is-QNJ2L.tmp\sysrc_trial.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QNJ2L.tmp\sysrc_trial.tmp" /SL5="$7011E,3063487,163328,C:\Users\Admin\AppData\Local\Temp\SysTweak Regclean Pro 6.21.65.1986\sysrc_trial.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-I091H.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • C:\Users\Admin\AppData\Local\Temp\is-QNJ2L.tmp\sysrc_trial.tmp

    Filesize

    1.1MB

    MD5

    53277db44ce8abc5f5dd4806f43138ee

    SHA1

    623e4aef72bdf841f646a0fe4732cb717702a41b

    SHA256

    d6ccb559b7e3c0dad46d391284a3fe7f2a1429af23682c548200906121c5de7a

    SHA512

    a5dfd334e1ea8159bec8be58f6476b41e54c753cd4d750c8ee5f61190270a7219eb9d229b8be2137a5f2d810cc1f81d9dddfc73e33273fb57aebaa9067f2ebcc

  • memory/3052-19-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-7-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-16-0x0000000007350000-0x000000000738C000-memory.dmp

    Filesize

    240KB

  • memory/3052-20-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-21-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-22-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-24-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-23-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-27-0x0000000007350000-0x000000000738C000-memory.dmp

    Filesize

    240KB

  • memory/3052-33-0x0000000007350000-0x000000000738C000-memory.dmp

    Filesize

    240KB

  • memory/4940-2-0x0000000000401000-0x0000000000417000-memory.dmp

    Filesize

    88KB

  • memory/4940-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4940-25-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB