Analysis

  • max time kernel
    112s
  • max time network
    80s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-06-2024 20:14

General

  • Target

    Update.exe

  • Size

    20.4MB

  • MD5

    88246c2a001042481486e559a6d10d91

  • SHA1

    e64a646ba23b7795ec3dfb5ae4d80b02c7dd274f

  • SHA256

    4a424271b9a191afc76110e2bccd45f23cc281853f223d3e27756e16c14b5019

  • SHA512

    f3daab1877324bc8ac1f52bc9d1c7327230840fc53899aed47b69dd6b7e996cf3fde70c7efe209fa6fb9d80d58687abbd2f144a66e26de17b99b539d20f6e5ad

  • SSDEEP

    393216:XlHpZSFSVTVyVSJXSUEJRnpyQnXUWJjv0xamVNA3guo9N:9p0FmyVSNSUE7npyQnkWJjv0DV23o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Update.exe
    "C:\Users\Admin\AppData\Local\Temp\Update.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\is-PF1B4.tmp\Update.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PF1B4.tmp\Update.tmp" /SL5="$300E2,20549816,832512,C:\Users\Admin\AppData\Local\Temp\Update.exe"
      2⤵
      • Executes dropped EXE
      PID:4352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-PF1B4.tmp\Update.tmp

    Filesize

    3.1MB

    MD5

    6a4ac87c4331dc724e6fea16e0ab4b7e

    SHA1

    3dcab7b5fc73352c01eb24e827626670fa323cec

    SHA256

    3b9ccf0ba93ecc3640ec5637d3bcfa030c260e6a6222ac7a4bebdd0a91af9a66

    SHA512

    dc8e3c8a90cd7751f069c5e00c40abbd66a407eeea783829c82242ff9d52fa9389220aed896705dd81911a9d007d3a394cb24c7c3c1e08020bbc2d3c371a9eb6

  • memory/4228-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4228-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/4228-8-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4352-6-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/4352-9-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB