Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 14:53

General

  • Target

    9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe

  • Size

    13KB

  • MD5

    e8556af51af3f96c089f10e23aaf44e6

  • SHA1

    3d494d35a5a1e9f645ef97342302cd27d36e6917

  • SHA256

    9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305

  • SHA512

    df83066e221ab0ee466132821148967bd770b049556aabc9a0f8496b6bca2984eb2efe19ce57f4c50441cfd98a6fe733b63b483187bb62db0fb4dee521369211

  • SSDEEP

    192:lKqI1fBiyKjm6pMA4fMefWdsXGaZPB7C+YWcMja8WgCHdLWlJdxqHXYruAf1x:riipoGaKqW9hWlJj+Q

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe
    "C:\Users\Admin\AppData\Local\Temp\9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145307283.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Users\Admin\AppData\Local\Temp\242604145307283.exe
        C:\Users\Admin\AppData\Local\Temp\242604145307283.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145318377.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3836
          • C:\Users\Admin\AppData\Local\Temp\242604145318377.exe
            C:\Users\Admin\AppData\Local\Temp\242604145318377.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4320
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145330142.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:316
              • C:\Users\Admin\AppData\Local\Temp\242604145330142.exe
                C:\Users\Admin\AppData\Local\Temp\242604145330142.exe 000003
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2216
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145350580.exe 000004
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2784
                  • C:\Users\Admin\AppData\Local\Temp\242604145350580.exe
                    C:\Users\Admin\AppData\Local\Temp\242604145350580.exe 000004
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:368
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145409299.exe 000005
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1188
                      • C:\Users\Admin\AppData\Local\Temp\242604145409299.exe
                        C:\Users\Admin\AppData\Local\Temp\242604145409299.exe 000005
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:1924
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145423002.exe 000006
                          12⤵
                          • Suspicious use of WriteProcessMemory
                          PID:888
                          • C:\Users\Admin\AppData\Local\Temp\242604145423002.exe
                            C:\Users\Admin\AppData\Local\Temp\242604145423002.exe 000006
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3224
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145434095.exe 000007
                              14⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3120
                              • C:\Users\Admin\AppData\Local\Temp\242604145434095.exe
                                C:\Users\Admin\AppData\Local\Temp\242604145434095.exe 000007
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:5072
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145447611.exe 000008
                                  16⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4224
                                  • C:\Users\Admin\AppData\Local\Temp\242604145447611.exe
                                    C:\Users\Admin\AppData\Local\Temp\242604145447611.exe 000008
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:2652
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145456986.exe 000009
                                      18⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3764
                                      • C:\Users\Admin\AppData\Local\Temp\242604145456986.exe
                                        C:\Users\Admin\AppData\Local\Temp\242604145456986.exe 000009
                                        19⤵
                                        • Executes dropped EXE
                                        PID:4796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\242604145307283.exe

    Filesize

    12KB

    MD5

    10b78d854aeb6fbae7e181290155278c

    SHA1

    97c2005866391a0e330abe6e6db20c734fd89ad0

    SHA256

    46217256948420377e69d2b7b81a84a96db8fba2d644e4fc3457f28c8ffccfb5

    SHA512

    7bde7a44317bfbbd7ffaf8514d9dd58dd3fd592d00813cc300832eed2cae9359b41c7f856a743e2ee7cc6ecf40440531fe33511f90fc5b7f7032214764c87f2e

  • C:\Users\Admin\AppData\Local\Temp\242604145318377.exe

    Filesize

    13KB

    MD5

    6f7490764b34817448b497f837de2c0c

    SHA1

    29f891bcee49d8d66eeb30e8ffa3aa44c5626e02

    SHA256

    1e71169c963c5c66abf8ad48898ca714006d18e450f99aeabbe22a8158d9f809

    SHA512

    8a8d0cfb32ea7badeae8f5eba352640b430707d40f4221a66a747f50901e38b01c432eb513dc13061439eae05dffae0987745db02e6154d62896eddd8fcd4d58

  • C:\Users\Admin\AppData\Local\Temp\242604145330142.exe

    Filesize

    13KB

    MD5

    df06590a6e6a690c77b2adc1023a18af

    SHA1

    27b043e2b4f54d14e83ba378d07415b8b75b485d

    SHA256

    85ff17ab3b8da83963fa1aea0d6eef401bc2646cf9c8e55c88df873f7bacb4d5

    SHA512

    cd8832c5f3685a9b645d5a6403a68beec6948fdc614de05c2ea5e870820c8c4f3356eb9d3a4a890b021ecb42d188d6c19e91b8c898999828fb0f96b42059e7b7

  • C:\Users\Admin\AppData\Local\Temp\242604145350580.exe

    Filesize

    12KB

    MD5

    909715d61dbec2ba087df311a8371e17

    SHA1

    0625cf1a3ce0cf3a0c93c787f2f5a90bc9e0c865

    SHA256

    8c06162cfc7a3fcb506d510e91639d31c02f54b932776996930a71e7532979e7

    SHA512

    9207910136251e6bfcb8d74a32f72725ed3e2eadcb380099f11142ab9b70185e173503405263a28b7b05a8473b3aee35a20cd6f81f324fbac3cd93edadc51045

  • C:\Users\Admin\AppData\Local\Temp\242604145409299.exe

    Filesize

    13KB

    MD5

    e503dd20bc331e7c7ed563161185347e

    SHA1

    9e6144cb99dffa5af63668418280e8e0d848e66c

    SHA256

    0621c0f37a1719bc30d47e524cea30dd473062dda49129c10edc86af4347073c

    SHA512

    728a58dcfbb86dd3b406f279663d255dfbd3b0298df8a573c0d336a0e37b7f9276f9f669255b18fc55b359b678d514a26030c1c7a5c28acee746883a0624a2a1

  • C:\Users\Admin\AppData\Local\Temp\242604145423002.exe

    Filesize

    12KB

    MD5

    a347c23e092641ead41664a007de4540

    SHA1

    5cae85bffaf3c5cb035c04948dc985fbae0bcd22

    SHA256

    c7defa90c60a6dc41cb4e559f818601f2af7b7132cb81a38c71c52e4ab832067

    SHA512

    74a299b14b6822ee5374d6e01a1e7c0dd816a694c722a9a73af3b4765548eca3b63928f3ea8cf259e31eb8bbcd02d325695ef396e4f5da2f7c4a99ddf104c130

  • C:\Users\Admin\AppData\Local\Temp\242604145434095.exe

    Filesize

    12KB

    MD5

    5d615cac16c061659450d7584c0986cd

    SHA1

    bf94c21816dbf36a766221170d89295764940948

    SHA256

    7e0bda80a878bad3e50fa61670fea13639101a8bea4157ed50b44ec881915ecf

    SHA512

    8efa4d6f807617e10511ed0fb8def7ad1016f20f057fb4dda748e0cd0145938251c50889dbc6570bf3772d605a754806aa2cbfe68926e586cd4362d5f54657b1

  • C:\Users\Admin\AppData\Local\Temp\242604145447611.exe

    Filesize

    13KB

    MD5

    58eb20dc2912c82445ac02b23f54b8a1

    SHA1

    fb2462de073cfc5aeb09ac17dc2ded943c245e36

    SHA256

    7ee49affc07059689fc6a48dc47432f7864f81e655ae1914c6f287742ebd4266

    SHA512

    709d2c00afb9736569c96002c3060d817713479f04f889bec920adade5c7952f870033590976b558527ff28f62cb4422bb3c84ffb37d7cc33a6087b36b5a4d51

  • C:\Users\Admin\AppData\Local\Temp\242604145456986.exe

    Filesize

    12KB

    MD5

    4fbe54ebf4fed2f18ad7171f94920eee

    SHA1

    d44423e9c40a4a90cd7fb1860aa0620fe2598d39

    SHA256

    05de5dda648a3ac37977bfac70e1a08a3ece6527f6b9a48caf922f8394397abf

    SHA512

    fce5e11da19e27673bc1fb8d858f23f128529531dce78cd441d1d5a0889707bc05e7a5a78d50bfba25167385f495c31e1956b8624b523610532c3b0e741cdf16