Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2022, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe
Resource
win10v2004-20220812-en
General
-
Target
0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe
-
Size
3.3MB
-
MD5
50203926799ec9f38dbc1c8cfffd7574
-
SHA1
44ad44bc2eb1daf41f51a0c74e6b70625387099d
-
SHA256
0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6
-
SHA512
168d3f59045fbd91186eb702dd6b59e36cb189d7bdb1aa154232d0e6e25566321407d42af3e500f7403739a2fe84516c84ae36e3dd3a117e3b7ad26789241232
-
SSDEEP
98304:kimAHrOKsaE+PH5PcAjqsR5bGu7r9YCKRY:kOimBEAqsR5bGCrSCKRY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1804 1524 0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe 83 PID 1524 wrote to memory of 1804 1524 0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe 83 PID 1524 wrote to memory of 1804 1524 0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe"C:\Users\Admin\AppData\Local\Temp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\is-3LL4E.tmp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.tmp"C:\Users\Admin\AppData\Local\Temp\is-3LL4E.tmp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.tmp" /SL5="$90034,2728125,715264,C:\Users\Admin\AppData\Local\Temp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.exe"2⤵
- Executes dropped EXE
PID:1804
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-3LL4E.tmp\0c40876f4824e55cd6a66200af095fc289c4d7ef399d59a70bd2c6c351b5fce6.tmp
Filesize2.4MB
MD59a6fefb6aebf1619d1915b8c07b51c41
SHA16bff0d239f7f7145c4004348660d04cbf9416cbd
SHA256d1aabe0b58b5885c65036fef53ee2d282d6f3bf1a2f915b3addc9b519b549212
SHA512b62461b0cbb42883a554bed5e7a59e21c77f6c38ba4ebe7edab048b013a3be4a71bb9ea8709e64597675687d4bc360ba15e8fef78aa22a15a9d467767b03af30