Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 07:14

General

  • Target

    c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe

  • Size

    14KB

  • MD5

    042ab4c4eec2df899cfd3ffb7b61fd80

  • SHA1

    a5e436a7df688f76a33372a26b30bd43fd99de65

  • SHA256

    c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84

  • SHA512

    711e6c77dffc91bca0aee6e5071daeb6c0a9fdd8a15d31afea4f16acae8c810022e6d78e2e17765df24176d4d57a161b9c59b82e405924746bf1e3bdc1fd100f

  • SSDEEP

    192:uQPzI1i7Ws3/FP6amDVZGZd1qtgWAyMgaaP9h55yOoOpupaFwKKoIWlJdxqHbnzv:XTWsPFaDCsUSFAv0IWlJj+l

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe
    "C:\Users\Admin\AppData\Local\Temp\c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071411312.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\242607071411312.exe
        C:\Users\Admin\AppData\Local\Temp\242607071411312.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071426921.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3676
          • C:\Users\Admin\AppData\Local\Temp\242607071426921.exe
            C:\Users\Admin\AppData\Local\Temp\242607071426921.exe 000002
            5⤵
            • Executes dropped EXE
            PID:1856

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\242607071411312.exe

          Filesize

          12KB

          MD5

          8d8bc1ffd70b13796b979241fdb9ab71

          SHA1

          01c662264cd94213cbca5cea0af3998ab172e20c

          SHA256

          01dc72ff9863d92e9c8d960a3db69913b51aa4658858ae95cc69b17003c6de81

          SHA512

          d9900ef99ca398859bfbcbfdf2e02569a285519aa8aeb77133e1c19c329fa1135f02de99af99aa38542db57ea93e77a5049575e6c0a34911da5191d8f3c287ec

        • C:\Users\Admin\AppData\Local\Temp\242607071426921.exe

          Filesize

          13KB

          MD5

          8cf5d9a20c43674e682f9a9f28ba6bb2

          SHA1

          49c88fbd829ad173d500112794cacf584a531125

          SHA256

          03df001fcf857970430d750330cae61d40db09dc2fe4f3f742b575700f90a527

          SHA512

          adfc0ad24918ce112ead7bd905168ed071a56dfb2358338a5eb35d33ef13d45f02776dce4457b6041e291d73b139105f1b5cb681723db26410940366f2f3ad73