Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2023 06:32
Static task
static1
Behavioral task
behavioral1
Sample
f905g80f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f905g80f.exe
Resource
win10v2004-20230915-en
General
-
Target
f905g80f.exe
-
Size
52.9MB
-
MD5
17c87cb308128a84ab4e6ceea817c202
-
SHA1
b3fb015f665038fe2024c84871325848bc6e646c
-
SHA256
d0121794d3c17b5dc6daad721e994d74ef804f08a777ec78715cb5fd82c3d3ef
-
SHA512
c3ebb95f7d5841c3139dd7c48f6b790c6cbd0bfff9a9dc0453e96863b461a2d74f2d1482a4e2fd9542cf442f39ef64efc447c6b91b9247d9a2328a48a7f92c8a
-
SSDEEP
1572864:D7dUEh69iy9ClaiHbKeqIdlC2D+3EwvQA:OB97BEJdlCv3EwV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 504 f905g80f.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 504 4544 f905g80f.exe 86 PID 4544 wrote to memory of 504 4544 f905g80f.exe 86 PID 4544 wrote to memory of 504 4544 f905g80f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp"C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp" /SL5="$110068,55051259,114176,C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"2⤵
- Executes dropped EXE
PID:504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555