Analysis
-
max time kernel
132s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
24-03-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe
Resource
win10v2004-20220310-en
General
-
Target
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe
-
Size
986KB
-
MD5
5fc34a006fa51232dbe699fe709f05b6
-
SHA1
a0840039cd6f7777809c685b38017882935fbc99
-
SHA256
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d
-
SHA512
e6dbf213009a0cd736abcc145ccd97c2199f445512651a6b7a305e22171a70706fd7014414b811b8e0f26a0ee8b7e310c70ff1aa20b46a0477c3ff2c99921a2c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmppid process 4892 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exedescription pid process target process PID 2684 wrote to memory of 4892 2684 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp PID 2684 wrote to memory of 4892 2684 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp PID 2684 wrote to memory of 4892 2684 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe 8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe"C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp"C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp" /SL5="$5011E,757510,121344,C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmpMD5
1a8ac942e4c2302d349caaed9943360d
SHA1a08ce743c3d90a2b713db3e58e747e7a00a32590
SHA256db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96
SHA512d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab
-
memory/2684-134-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2684-136-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/4892-137-0x0000000000000000-mapping.dmp