Analysis
-
max time kernel
112s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-06-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
Update.exe
Resource
win10-20240404-en
General
-
Target
Update.exe
-
Size
20.4MB
-
MD5
88246c2a001042481486e559a6d10d91
-
SHA1
e64a646ba23b7795ec3dfb5ae4d80b02c7dd274f
-
SHA256
4a424271b9a191afc76110e2bccd45f23cc281853f223d3e27756e16c14b5019
-
SHA512
f3daab1877324bc8ac1f52bc9d1c7327230840fc53899aed47b69dd6b7e996cf3fde70c7efe209fa6fb9d80d58687abbd2f144a66e26de17b99b539d20f6e5ad
-
SSDEEP
393216:XlHpZSFSVTVyVSJXSUEJRnpyQnXUWJjv0xamVNA3guo9N:9p0FmyVSNSUE7npyQnkWJjv0DV23o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Update.tmppid process 4352 Update.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Update.exedescription pid process target process PID 4228 wrote to memory of 4352 4228 Update.exe Update.tmp PID 4228 wrote to memory of 4352 4228 Update.exe Update.tmp PID 4228 wrote to memory of 4352 4228 Update.exe Update.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\is-PF1B4.tmp\Update.tmp"C:\Users\Admin\AppData\Local\Temp\is-PF1B4.tmp\Update.tmp" /SL5="$300E2,20549816,832512,C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Executes dropped EXE
PID:4352
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56a4ac87c4331dc724e6fea16e0ab4b7e
SHA13dcab7b5fc73352c01eb24e827626670fa323cec
SHA2563b9ccf0ba93ecc3640ec5637d3bcfa030c260e6a6222ac7a4bebdd0a91af9a66
SHA512dc8e3c8a90cd7751f069c5e00c40abbd66a407eeea783829c82242ff9d52fa9389220aed896705dd81911a9d007d3a394cb24c7c3c1e08020bbc2d3c371a9eb6