Analysis

  • max time kernel
    108s
  • max time network
    111s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-06-2024 07:13

General

  • Target

    1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe

  • Size

    12KB

  • MD5

    d44c59c2489ea52a3a58a2b88293abe4

  • SHA1

    19ae382f79a556ab191f6a99abaecf9ed10ee5a2

  • SHA256

    1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce

  • SHA512

    1966aa3548efca56d5b22f171ee01fcd8d0d691b31f6dd7eb9a428bbb7dbc74c2ba5449aba8fdc220d607f034c0a4f0130bbf011077d907166278e3923a49439

  • SSDEEP

    192:9aLI16T8GITcN6BORFKvftUs8bf3v8LPfVSJYNaG+WlJdxqHS1x:+sGIoXsq8hlX+WlJj+A

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe
    "C:\Users\Admin\AppData\Local\Temp\1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071314372.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\242607071314372.exe
        C:\Users\Admin\AppData\Local\Temp\242607071314372.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071327669.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Users\Admin\AppData\Local\Temp\242607071327669.exe
            C:\Users\Admin\AppData\Local\Temp\242607071327669.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:736
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071342419.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3088
              • C:\Users\Admin\AppData\Local\Temp\242607071342419.exe
                C:\Users\Admin\AppData\Local\Temp\242607071342419.exe 000003
                7⤵
                • Executes dropped EXE
                PID:3092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\242607071314372.exe

    Filesize

    12KB

    MD5

    7f7dd5dd3fd764abe7b8ea521d77b831

    SHA1

    1970013557018155a8bd2873fd5ff84747c455bf

    SHA256

    17d5d4c26869599da71a63dbcc92af88e0173c78660351daaf33fcfe6a1f9749

    SHA512

    663493c477768e4df259bece9f40ea9189d7b0aacd2c455cc4e8832fadea05e2c474a7c306c9b92b3d7581e241e0f080c03ad963e3d26d72b30a8a996ffaf8b1

  • C:\Users\Admin\AppData\Local\Temp\242607071327669.exe

    Filesize

    13KB

    MD5

    0b869671a82bc6b3ffe59cba8106c86d

    SHA1

    d79441aa92fffd9cc1b3eb29c49ecfbc42d88aba

    SHA256

    b6aa401abf38cc2477e0e10be68fb54ea71ea99049099d642661a9e2a8d43d05

    SHA512

    67445aa2165d703b46e66430b23303adf2fb3cf035d65471e143462bcc5189541bd2bcf7592c2ba6cb34292d3586356e11aceb84b220664cfd114656532f505d

  • C:\Users\Admin\AppData\Local\Temp\242607071342419.exe

    Filesize

    12KB

    MD5

    29079ad2ee82ee628acd4af795f67f58

    SHA1

    8b4608bd66b2cac4686d612f12ef2f35825c0305

    SHA256

    6c05a2cad4fa4ee71fc10bdcc73c24acc412d0201733a299ed4f4906ba90031f

    SHA512

    19d2125e2cd664332f657b4e379103c91303123bafdff8c493964ce80cb287fdff5fbdd8a11c7f4f0c8c8f7a4a0ed9d18b0478913adc2900ed931b1105e66820