Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
PixelGPTSetup_v4_62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
PixelGPTSetup_v4_62.exe
Resource
win10v2004-20240508-en
General
-
Target
PixelGPTSetup_v4_62.exe
-
Size
84.5MB
-
MD5
e575b29dc82be528c686ea13e57894da
-
SHA1
0f4b6ff1cc5157bef7faa395f4d19acfd448c4c4
-
SHA256
d91e945cbe3a9eae4f24509753cb485f088c1096c2dff94f8f578fc28d3f000a
-
SHA512
b60e878eabfc689b1de9813f9e95f12047b138ba175b55fbf98411445fd124a03d01380121d73df4d991be9f88b5ef492197eae908a8c92295113aeb323366be
-
SSDEEP
1572864:fhW9p1jV+/bdrcIRlw7N+x+/tzjUA6PZfpWTXajrFy8vFpyd55tASLcZJc:f0X1jU/5rckOZzjw27aPFyKk55Wf7c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
PixelGPTSetup_v4_62.tmppid process 4188 PixelGPTSetup_v4_62.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
PixelGPTSetup_v4_62.exedescription pid process target process PID 1316 wrote to memory of 4188 1316 PixelGPTSetup_v4_62.exe PixelGPTSetup_v4_62.tmp PID 1316 wrote to memory of 4188 1316 PixelGPTSetup_v4_62.exe PixelGPTSetup_v4_62.tmp PID 1316 wrote to memory of 4188 1316 PixelGPTSetup_v4_62.exe PixelGPTSetup_v4_62.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\PixelGPTSetup_v4_62.exe"C:\Users\Admin\AppData\Local\Temp\PixelGPTSetup_v4_62.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\is-7L7PT.tmp\PixelGPTSetup_v4_62.tmp"C:\Users\Admin\AppData\Local\Temp\is-7L7PT.tmp\PixelGPTSetup_v4_62.tmp" /SL5="$6020A,86636148,926720,C:\Users\Admin\AppData\Local\Temp\PixelGPTSetup_v4_62.exe"2⤵
- Executes dropped EXE
PID:4188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD57a78b1dde79f298c4d7c68c148564fc6
SHA1d50769de0fb9472d4397dc55b66bef5525b285cc
SHA2567afd4c548e106eb34df346f3365234c57ae41c70d243a76cb54a7d9663c159bf
SHA512a4777a9ebb75f0983b4a60159cbe8318ebe03f374cb3b6188de7522e1489b6d7195bd9743f1269279eb643e950bb573a747835c82213b7fa10f81914d95b295a