Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 14:16

General

  • Target

    638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe

  • Size

    12KB

  • MD5

    d9b8daefcbf130dc56ff6aad93eaf8fe

  • SHA1

    a7fc5dff8460b447b6db9a9c1dda735dff9993c5

  • SHA256

    638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790

  • SHA512

    02049eb22f4aaed76928dde60babdae2557de2e0a1b99bca4fc421f3a11da587d02161e67f2ba87f658f8b73d43cbe58c6f70f2829b81520458fed6cf10a4183

  • SSDEEP

    192:0lzT5Qna0mSj66Fuik/pzVE3+qkz61I7Uusokl3XrGBWlJdxqHXrOk:G30tGdwukqBWlJj+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe
    "C:\Users\Admin\AppData\Local\Temp\638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240603141649324.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\240603141649324.exe
        C:\Users\Admin\AppData\Local\Temp\240603141649324.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141652402.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5232
          • C:\Users\Admin\AppData\Local\Temp\242603141652402.exe
            C:\Users\Admin\AppData\Local\Temp\242603141652402.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:6004
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141701777.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4192
              • C:\Users\Admin\AppData\Local\Temp\242603141701777.exe
                C:\Users\Admin\AppData\Local\Temp\242603141701777.exe 000003
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3372
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141710808.exe 000004
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3840
                  • C:\Users\Admin\AppData\Local\Temp\242603141710808.exe
                    C:\Users\Admin\AppData\Local\Temp\242603141710808.exe 000004
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4528
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141720358.exe 000005
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:6096
                      • C:\Users\Admin\AppData\Local\Temp\242603141720358.exe
                        C:\Users\Admin\AppData\Local\Temp\242603141720358.exe 000005
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:5552
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141729839.exe 000006
                          12⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2996
                          • C:\Users\Admin\AppData\Local\Temp\242603141729839.exe
                            C:\Users\Admin\AppData\Local\Temp\242603141729839.exe 000006
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:5236
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141739480.exe 000007
                              14⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2668
                              • C:\Users\Admin\AppData\Local\Temp\242603141739480.exe
                                C:\Users\Admin\AppData\Local\Temp\242603141739480.exe 000007
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:1612
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141748996.exe 000008
                                  16⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:2000
                                  • C:\Users\Admin\AppData\Local\Temp\242603141748996.exe
                                    C:\Users\Admin\AppData\Local\Temp\242603141748996.exe 000008
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:5664
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141758808.exe 000009
                                      18⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:5680
                                      • C:\Users\Admin\AppData\Local\Temp\242603141758808.exe
                                        C:\Users\Admin\AppData\Local\Temp\242603141758808.exe 000009
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:1088
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141809199.exe 00000a
                                          20⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:4808
                                          • C:\Users\Admin\AppData\Local\Temp\242603141809199.exe
                                            C:\Users\Admin\AppData\Local\Temp\242603141809199.exe 00000a
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:4136
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141818855.exe 00000b
                                              22⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:4180
                                              • C:\Users\Admin\AppData\Local\Temp\242603141818855.exe
                                                C:\Users\Admin\AppData\Local\Temp\242603141818855.exe 00000b
                                                23⤵
                                                • Executes dropped EXE
                                                • Suspicious use of WriteProcessMemory
                                                PID:3592
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141828339.exe 00000c
                                                  24⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4796
                                                  • C:\Users\Admin\AppData\Local\Temp\242603141828339.exe
                                                    C:\Users\Admin\AppData\Local\Temp\242603141828339.exe 00000c
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:6092
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141837949.exe 00000d
                                                      26⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:5744
                                                      • C:\Users\Admin\AppData\Local\Temp\242603141837949.exe
                                                        C:\Users\Admin\AppData\Local\Temp\242603141837949.exe 00000d
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:1440
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141847621.exe 00000e
                                                          28⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:1980
                                                          • C:\Users\Admin\AppData\Local\Temp\242603141847621.exe
                                                            C:\Users\Admin\AppData\Local\Temp\242603141847621.exe 00000e
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:3484
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141857027.exe 00000f
                                                              30⤵
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:3004
                                                              • C:\Users\Admin\AppData\Local\Temp\242603141857027.exe
                                                                C:\Users\Admin\AppData\Local\Temp\242603141857027.exe 00000f
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2012
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141906855.exe 000010
                                                                  32⤵
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:3940
                                                                  • C:\Users\Admin\AppData\Local\Temp\242603141906855.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\242603141906855.exe 000010
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:2620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\240603141649324.exe

    Filesize

    12KB

    MD5

    9607669e0e554d15e110a4065deff150

    SHA1

    36cf1ccad79fac03ab3068243ab5104cc69a86f3

    SHA256

    20bad66825ffa7e102ce534221b78d4cc993fca792d3fcb613db80ee25dfc9e9

    SHA512

    48d17244d956305ab773d97523dc57e024715685d49f5685967f4e186c0fe43be1792bf567965d67a9442677d0ec30f4ec9559fab59820f2643bd84818f2bb00

  • C:\Users\Admin\AppData\Local\Temp\242603141652402.exe

    Filesize

    13KB

    MD5

    66cec024f3086cf6f628ebf720f37114

    SHA1

    3e0f0701ac79b73289323aed6a185f6b113b02df

    SHA256

    2f48132d00b98a97ebe4848db9f4f063320b3029276bd77a5adfd172690bb01f

    SHA512

    363c0037b5066826687d35b89ddb0889b983493a69468157ec80d81dcb3bf7286df0124c9480b2ae291308312f60133367fab9a408b42ce443003a19ac73da3e

  • C:\Users\Admin\AppData\Local\Temp\242603141701777.exe

    Filesize

    13KB

    MD5

    11041f38efd7b292c44655a373494500

    SHA1

    79a4deca7985093ab8ceed61c85d6b4b584e9ee0

    SHA256

    a653ca072bc1e526ba3851d4305d4121121a3778cbb2b37656cbf6fc10c06353

    SHA512

    850e28978093524acb9c86c7efb3abbfd985e3f0b08d91a6991a7decf27ecd46600eca6297846920ab01cba0e13ae9f943c4a58b542e2b4cd09307d76bd2239e

  • C:\Users\Admin\AppData\Local\Temp\242603141710808.exe

    Filesize

    13KB

    MD5

    20db0c36e18813afbfe4a8964773ed10

    SHA1

    4f71b6bedc213c20548b9e0043de4648b150f096

    SHA256

    7698228fdb929db360745c4fd70292ba2498eb4eeef648ed40b3f829fb3abc62

    SHA512

    fc133f8f48823e34c4e60f0c3763e8ee9ad49646e05e0f59ef27fbf180baa5d3458407dcbe8bb9e37a1a5ad11982094fd0f14f3c2750a6a0ae3cc9ed546fa988

  • C:\Users\Admin\AppData\Local\Temp\242603141720358.exe

    Filesize

    13KB

    MD5

    362f655ce12c7c51742e6281f38ffe29

    SHA1

    70c290a445e989b2eb45e14186791d9c3a9c6a9d

    SHA256

    fb9d6304467b59d01f259bb0c1e57a34727980661e15cff72e5cb92ab7a7666a

    SHA512

    3869bcbcea823930ad877e877e566bfb835821d704e312ee9f3119b48b89727300f7f39ed0e9ee2039b7d4014b6e7bd9d25de7aa74aee65e698b4ff9c29f39d1

  • C:\Users\Admin\AppData\Local\Temp\242603141729839.exe

    Filesize

    13KB

    MD5

    9af0da8a4ec13f8165e757fc3d4bc192

    SHA1

    337d7154f8d0e0c0d2d1043e0477938384ef9d8c

    SHA256

    4b48c86dfe26abdae94fb86f53aef619e4a125126ccc65f7511632d8f82223f2

    SHA512

    b7d2ee537a19752ba52f18e618b0b0a5a32f245a0c64a9a35552ee07a10cea5141b9f5f019fc0d3777e9b48b2addcda65c873039df356e24178c147ca3e2702e

  • C:\Users\Admin\AppData\Local\Temp\242603141739480.exe

    Filesize

    12KB

    MD5

    7b356c0d15bc7f2253a5ea20ea53ecf6

    SHA1

    640fd4885a225cdfb0978d4688e66fa0ab16e2bb

    SHA256

    ef67af6de80e3e9c00463a26340953fcd86980409720380f73c32ffce12044a5

    SHA512

    965747bb712b872749abe9283b4c4df6c5b5eda84662715b064a6fe41311cc5a59faf32cbfba2d2129b4be72f554fc9be7c0b7849a60d77e302b0677c98cdc88

  • C:\Users\Admin\AppData\Local\Temp\242603141748996.exe

    Filesize

    13KB

    MD5

    d66e9d8b8789c29b99356fb9818629dc

    SHA1

    fae8b14ff35bdfd39e37069378d241af8f4e8d31

    SHA256

    49859ac49a705b87c60897cb8d939de3fe1b5f00db6866aec240bb0abff85726

    SHA512

    bf67e42094a02efb1a29ef635b25e8bd245804578fffc7ff1b0a5b832609065e04f9af3461dfd8df240f6031b239d454ef14e816b7d925add77342d28c361425

  • C:\Users\Admin\AppData\Local\Temp\242603141758808.exe

    Filesize

    13KB

    MD5

    c0fea79e0ec85093df1ebc61b336a8e6

    SHA1

    aede96b4b0de415540e5137e36881a9eba4326eb

    SHA256

    6239194206f6b117874293d16431d4446deb47645755fffcf844f6db3e004f7a

    SHA512

    eefffbce59b23ed5084eab255ef6de40bc017c9a4a7979cb6d4bfbb4ef2eb9004075e203fd133a4246dd5674a0f2327204651bd1d83a66859456717bd92c4cdf

  • C:\Users\Admin\AppData\Local\Temp\242603141809199.exe

    Filesize

    12KB

    MD5

    c7a8f67950b1b5a023800f016ec41023

    SHA1

    bfdba600be922bb4e2fce9c8991abd4581ea022a

    SHA256

    2820c9b5872c8642d23613356553e4c1aa244614385181a695dc18c58c070b99

    SHA512

    0c7b7531e8e4af85945c16415f0eeae178b08705b15d3cfd73b4bd8239afb85f1d5324bbbe0d7c019a385b77a545da55f3d17c4d9dc96b2d408e02982ce0d8f2

  • C:\Users\Admin\AppData\Local\Temp\242603141818855.exe

    Filesize

    13KB

    MD5

    f91cba4cc616982bcc101f0d772c7297

    SHA1

    caa7a450543934c16c826fc0360dce7563de04e6

    SHA256

    c750e34758e8a96579310bbd45fa22b2df9149deb86832ac1abbcaaaf37dab6c

    SHA512

    4976c0deaf181619d30a26c7e35d26e35a84d82005b61b06e66ced6ef9ac7d6a0e62593b0c4b324d5f09f0106d0f244052821a56fceee7e43092ba5645540e5a

  • C:\Users\Admin\AppData\Local\Temp\242603141828339.exe

    Filesize

    13KB

    MD5

    612c011d75127a11357b8c0d948db019

    SHA1

    d2191587841209302f993b56f20d1f980425a537

    SHA256

    2e30e333e0c969d962b2bdac49b6cc3102a6aae0d45e74ae3c982794231e387e

    SHA512

    3ed6111b2e0326814fad6a916eeea33f71e35b47c5871de2dca3382693411f72eae06bb09e5049a5d1a06deb88835f43d3d6e3a125c68e585ecdbe9f16a6cc89

  • C:\Users\Admin\AppData\Local\Temp\242603141837949.exe

    Filesize

    13KB

    MD5

    bda2e7e0892b919e9e5c48c61e2151a2

    SHA1

    fa123eed8da0169c289ddbd131287b46e0ee91f4

    SHA256

    a9c0a54f4e1b6f298bb6fd67eb1cc23a942cc6c6a8be22f66345dcd5f4cd21e8

    SHA512

    d397a7c196d192d62a8e9756ad48bdfe04b2f8fcf41d877a01946bcb85b094e72524a06df98e37ca49ea81613d3878967fdef4e90a414e8d5df73a39841cb9fb

  • C:\Users\Admin\AppData\Local\Temp\242603141847621.exe

    Filesize

    13KB

    MD5

    241e1ca369ad7d30687fd4f561f8e485

    SHA1

    fd94a871c3d8e8e62b2dfcb53be95e1b813bb5c4

    SHA256

    258f95a4db177983ff9e83ddc639919040df0bb1605a1564fb72c38854c2562f

    SHA512

    9a2079712321f88728bd0aa68bd9dea372927f7dd41f405ab6c7c1ffc4e559e003c6058ee51c2065eef8ceabaf9bf6ca32828aade378e404c2f69d2f458f5049

  • C:\Users\Admin\AppData\Local\Temp\242603141857027.exe

    Filesize

    12KB

    MD5

    f7bc270266529ece83db8dd2792c6485

    SHA1

    71702640c4cea68615bcd8b6f337541abd8bed45

    SHA256

    fc958027b8ad47683eac90ee30851376b239869008e79884ed6981289772348f

    SHA512

    b78870f321ea6f25ea0df124740dbcd382fe6b30e67c6cc561b523f53ddfaa2ac8268463103a4515a766d0b11ba0cd3acbfcd84db8a120d3eac3ba021f91dab2

  • C:\Users\Admin\AppData\Local\Temp\242603141906855.exe

    Filesize

    12KB

    MD5

    76a4371bf12092bbcf41c91c9b37c27c

    SHA1

    a125ba72fe3412fff3d2a5a377df04005b6082ed

    SHA256

    ef533666c9744a1169f2b34469e1ea2459c4c35704fc98a8fa68c3a85d0a9558

    SHA512

    b5cf19e167c38a4fc8539d77b2a751c6b7876a10c4e73b836ebf7b8a30a7f4824de2b369562c872a1756396454fc6db7cf7c6ca7b88d1d738aab5ada7b766650