Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 22:14

General

  • Target

    HY_VCDEASY310_SZL.exe

  • Size

    712KB

  • MD5

    588ce3ad8da6b05793c3c5b47e637fa8

  • SHA1

    bf35f5abf680a657597d0d941411e8532693b1ec

  • SHA256

    07a51d3246ee996ace65337b0f97b3b75b95101ab03596c3b4fb86871841117c

  • SHA512

    3f032d7061df883415b1bdde24d1f00a880f9f60c9a7c7740f193aba74b7d9945554755398f430f317c68e4fe562aba9b9c3470e2338a123332e3b0239ad8666

  • SSDEEP

    12288:oUlmhLR6pN6CrxlcC0k3CZ6kDeX2f378BR+Jahp2vYH+y8xCb6LP1b7MMiMr41YO:hk+BrxqC0k+HDeX2fY0JaKv9/xCbgZ+x

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HY_VCDEASY310_SZL.exe
    "C:\Users\Admin\AppData\Local\Temp\HY_VCDEASY310_SZL.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:4400

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\GLC7138.tmp

          Filesize

          161KB

          MD5

          8c97d8bb1470c6498e47b12c5a03ce39

          SHA1

          15d233b22f1c3d756dca29bcc0021e6fb0b8cdf7

          SHA256

          a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a

          SHA512

          7ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f

        • C:\Users\Admin\AppData\Local\Temp\GLH7168.tmp

          Filesize

          33KB

          MD5

          b4bfa3e42692e76a00e3b7f9cfc7d876

          SHA1

          3fe49338f88a3b26b32088a00f3c0d4c22c1595b

          SHA256

          101210bdecfc7deab857224f7f35cbe00bdd068581c26c8a08768b0a8a1c264d

          SHA512

          ad6a1e76e214966066528ccaba0179b9046359b56815d597759c1e2e28359d5c51a7b4898e4a5206b3a5c6a6c067840c726cd6e99aa99385b814e91a045bb2c4

        • C:\Users\Admin\AppData\Local\Temp\GLK736D.tmp

          Filesize

          33KB

          MD5

          3afff622b9736ab03c21b156da978c01

          SHA1

          10821b02e6878b1beb11187fa470f861221c3e81

          SHA256

          48ef1e6f04e455d1a354f2a512de7ff85c0c2a3b5cd3497a76ebe77a8318df6c

          SHA512

          30de83a83b555b18b679dec0edd66552e2374707966efa286c9843dc24a61a2d7c57fd574561478cc9aa74f55fc42527b2ce06b281e17134c4fa8a17a9c213fd

        • memory/4400-8-0x00000000021A0000-0x00000000021AD000-memory.dmp

          Filesize

          52KB