Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe
Resource
win10v2004-20230831-en
General
-
Target
cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe
-
Size
812KB
-
MD5
96d140cbecfc9859ebf9888b1eef0f4c
-
SHA1
a212066f78fe54a5f6f289bd5cbaebe312269637
-
SHA256
cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0
-
SHA512
6d4240d24398475ec6b641d5de67260f5f6075463a07bc2913ab1b6b3abd578a532fdd632ce75aea336ea73eef4898bfedc147aa819005d43cff34c3553e6fdd
-
SSDEEP
12288:5qmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:5qxtVfNDb31oT41+aneOrO4p2zMOZ/V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1892 1F0F0D0B120F156B155C15A0C0E160A0D160A.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4472 cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe 1892 1F0F0D0B120F156B155C15A0C0E160A0D160A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1892 4472 cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe 85 PID 4472 wrote to memory of 1892 4472 cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe 85 PID 4472 wrote to memory of 1892 4472 cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe"C:\Users\Admin\AppData\Local\Temp\cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exeC:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD5a1db4e7044820bd89330a33982eb9073
SHA19b9f184f2984b5d64d804b71ec2c0329dc4e4ed2
SHA256a7f9da41edf82fc2f6ea72dbb5f262a1c8bf58417d942684faee4e0ff25497d9
SHA51241d6c4bfb76ae42ee32ebcf4f6fe124af9a86260fe46829b1f91b1da2d48219b2369079f03039f6f0e63e371b41ace281216fda3f87019d12c6237a484c6cc68
-
Filesize
812KB
MD5a1db4e7044820bd89330a33982eb9073
SHA19b9f184f2984b5d64d804b71ec2c0329dc4e4ed2
SHA256a7f9da41edf82fc2f6ea72dbb5f262a1c8bf58417d942684faee4e0ff25497d9
SHA51241d6c4bfb76ae42ee32ebcf4f6fe124af9a86260fe46829b1f91b1da2d48219b2369079f03039f6f0e63e371b41ace281216fda3f87019d12c6237a484c6cc68