Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-06-2024 03:07

General

  • Target

    Renoise 3.2.1/Renoise_Reg.exe

  • Size

    104.1MB

  • MD5

    65a1d518e6ed6bc08f7f112134a1a5c9

  • SHA1

    74c02aa7156d0319ae3b971ea8cc3192941871ba

  • SHA256

    65f056b599e693d731a2987a9b575af7815ddacee0189df2d16032dd467c0260

  • SHA512

    8d315b5ca1a4d7bf50fefbc26cd1bac7d509c1cf65050355f1e359d7f714d6790958ea4a9119d45dc181544357f7f3f066a461c943798e242b9c762a04b94cb8

  • SSDEEP

    3145728:kdvi4cI9TZxw/1VX9QRarPUnAX5QU4eOZ8R:IvcAxE1NfbUAX5QU4ebR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Renoise 3.2.1\Renoise_Reg.exe
    "C:\Users\Admin\AppData\Local\Temp\Renoise 3.2.1\Renoise_Reg.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Users\Admin\AppData\Local\Temp\is-CHTNC.tmp\Renoise_Reg.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CHTNC.tmp\Renoise_Reg.tmp" /SL5="$500DA,108781842,58368,C:\Users\Admin\AppData\Local\Temp\Renoise 3.2.1\Renoise_Reg.exe"
      2⤵
      • Executes dropped EXE
      PID:5028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-CHTNC.tmp\Renoise_Reg.tmp
    Filesize

    711KB

    MD5

    476c82bcb3ed77b60210aa55bc6fc7aa

    SHA1

    e6aa0782ad39a828d3976558b2f5737b93725d3f

    SHA256

    0955e1db1735522f10261c200fc9e0cc73e2135d53759d9514cf55c5c421aa34

    SHA512

    847f2d21e59b9988a1ba0e6e3d7a435c2bd3ef2b1a4c3f63d05931a125d607f81ed22cb34337667c3c9d73119e122ddc1f178d15d33aa2df4313a7dc788b22ca

  • memory/4100-0-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/4100-2-0x0000000000401000-0x000000000040C000-memory.dmp
    Filesize

    44KB

  • memory/4100-8-0x0000000000400000-0x0000000000415000-memory.dmp
    Filesize

    84KB

  • memory/5028-6-0x0000000000400000-0x00000000004BF000-memory.dmp
    Filesize

    764KB

  • memory/5028-9-0x0000000000400000-0x00000000004BF000-memory.dmp
    Filesize

    764KB