Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 07:12

General

  • Target

    f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe

  • Size

    13KB

  • MD5

    f09e783a6ce7b15b4a79a3d7a10d28c3

  • SHA1

    b2e817181d588ccb5366d05bfef58d45cb267d8c

  • SHA256

    f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb

  • SHA512

    aa5b1e3263990d4cdadb1961b9d084a3f56294c67d7b6387cbecf49b01b1f3f0fbf714614e4d4c70465054dced1b68912de6be8e2e2268b201b22f40eb0ed930

  • SSDEEP

    192:EviI1/iYuYtgxG6pfdvvuMs2osxJsUhlLPy2Xbo2dy/9ed9/6CX6+WWlJdxqHbnW:51Y+RH73scl+eJa9eH7XiWlJj+Q

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe
    "C:\Users\Admin\AppData\Local\Temp\f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071225310.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\242607071225310.exe
        C:\Users\Admin\AppData\Local\Temp\242607071225310.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071311529.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3544
          • C:\Users\Admin\AppData\Local\Temp\242607071311529.exe
            C:\Users\Admin\AppData\Local\Temp\242607071311529.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1516
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071326404.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1012
              • C:\Users\Admin\AppData\Local\Temp\242607071326404.exe
                C:\Users\Admin\AppData\Local\Temp\242607071326404.exe 000003
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4356
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071338904.exe 000004
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:880
                  • C:\Users\Admin\AppData\Local\Temp\242607071338904.exe
                    C:\Users\Admin\AppData\Local\Temp\242607071338904.exe 000004
                    9⤵
                    • Executes dropped EXE
                    PID:4520
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4612,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=1300 /prefetch:8
    1⤵
      PID:3076

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\242607071225310.exe

            Filesize

            14KB

            MD5

            76f2a5b5c0b917e45ce3552be1431a1f

            SHA1

            91913d1ea422e4a1e1147a336d9293cbb757022f

            SHA256

            58d062e388b71511da4a413a5baa57f7f9b2a958a0ad8ca2437ede07612e7d72

            SHA512

            ed051bcd50e8011845cf6a913cf93dd238ea96d3995242d3509c55fe17e1c487b27463e94cdb1330f02020d56ce5b7e931d32dd4680b9705979f616a8d764f25

          • C:\Users\Admin\AppData\Local\Temp\242607071311529.exe

            Filesize

            13KB

            MD5

            89e13f5ff4c510b17ad70b7c1c24a5ea

            SHA1

            81a148d7bf8479c1a9339d6491c62fde417c63d0

            SHA256

            918c0efaad8e489c24f8558240c93ee82f3189e2ad6386054e7d815ff7f78205

            SHA512

            f97bf8c8c70169e045e7f814408480addab5eace68c23d3e06c9a3a87ff375c8d4d36a1d6df429cddaa57f0fcfdb568bfb61ccf3251b455537cf31781e4529af

          • C:\Users\Admin\AppData\Local\Temp\242607071326404.exe

            Filesize

            12KB

            MD5

            ed80ea29dbeb81a4e8820a07c814bde4

            SHA1

            cd7bb55c8333b31f58c8bf585849ae23b66e2e73

            SHA256

            678dd85d5565098cea6f0082e8281a4156ac6b87d3cd385a13f85d8e811f9460

            SHA512

            3f7c52687f8a1558e9b98003b8198aa629aa9141a0328d82132c91cabbf377cf45a001ab65e9a6275422687878e3534bb51ebd6187675870a1c3e9f456982e37

          • C:\Users\Admin\AppData\Local\Temp\242607071338904.exe

            Filesize

            13KB

            MD5

            3ee15eb7f3356a3d9478c2ff9de9891b

            SHA1

            93b44cc72f45057b9633bbf2086c576070c52315

            SHA256

            081a0cb4df1940d392170a0ea0e7e4b443c9a74ea408b90e204fd8ffa52e43d9

            SHA512

            4b18a9641f844ade613239851614cc3723692f102fb19ca16b759b44fae198d5a03797eb8d9b6bb50c2524e045fb9958ccc4c43abd38e378a9d5fc31b272c022