Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2A123997C73517F9200191ABA7F25C39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2A123997C73517F9200191ABA7F25C39.exe
Resource
win10v2004-20220812-en
General
-
Target
2A123997C73517F9200191ABA7F25C39.exe
-
Size
288KB
-
MD5
2a123997c73517f9200191aba7f25c39
-
SHA1
e6d34b394ab0f393ac03e838e5ccc6c893e1ad9c
-
SHA256
f90a4bc19717e25d8117e3b4ecf24539c695a1e3173b93b3d68e1a651476becd
-
SHA512
8c3284b45ce46608328d664ba6643526707bbe9f36de545709022319512765e15c05c87d351970a130625d3b02c40eb31c7fc755262d57c538dc5617a76609b6
-
SSDEEP
6144:3/2UwgZXPSJMzKnKv1VY3Q4BwJFOuJ/oYcS5X63z:v2UtZXPScqKvnY3QyunoYcS5KD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4772 2A123997C73517F9200191ABA7F25C39.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4772 4992 2A123997C73517F9200191ABA7F25C39.exe 79 PID 4992 wrote to memory of 4772 4992 2A123997C73517F9200191ABA7F25C39.exe 79 PID 4992 wrote to memory of 4772 4992 2A123997C73517F9200191ABA7F25C39.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\2A123997C73517F9200191ABA7F25C39.exe"C:\Users\Admin\AppData\Local\Temp\2A123997C73517F9200191ABA7F25C39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\is-40UMF.tmp\2A123997C73517F9200191ABA7F25C39.tmp"C:\Users\Admin\AppData\Local\Temp\is-40UMF.tmp\2A123997C73517F9200191ABA7F25C39.tmp" /SL5="$8003A,59159,53248,C:\Users\Admin\AppData\Local\Temp\2A123997C73517F9200191ABA7F25C39.exe"2⤵
- Executes dropped EXE
PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba