Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2023 06:34
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
3.3MB
-
MD5
0f188231c29fba40e8b3e76792464cff
-
SHA1
e231f8e1060915dcb83fcf383ce0c80dbb94b2ea
-
SHA256
690e898fd01b69ac3eea36ac0bde48295eeb37b85a76ab96368b02dd7ee51615
-
SHA512
2d430c8bc5d5473bcc41e22bff252f1c09e632a4baaa5da4ac011ba13bf102ccc7a80541293a965a6ff80ca47b3d4271fd1e35c878a2b4ff0123af172f16f803
-
SSDEEP
98304:sqNAQ6FGtvX6KN5hBAud6kDjGpUefle0GzDKKD:sqN5u06KN5hZnse0GzJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1772 set thread context of 2012 1772 tmp.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
tmp.execmd.exepid process 1772 tmp.exe 2012 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
tmp.execmd.exepid process 1772 tmp.exe 2012 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.execmd.exedescription pid process target process PID 1772 wrote to memory of 2012 1772 tmp.exe cmd.exe PID 1772 wrote to memory of 2012 1772 tmp.exe cmd.exe PID 1772 wrote to memory of 2012 1772 tmp.exe cmd.exe PID 1772 wrote to memory of 2012 1772 tmp.exe cmd.exe PID 2012 wrote to memory of 3304 2012 cmd.exe explorer.exe PID 2012 wrote to memory of 3304 2012 cmd.exe explorer.exe PID 2012 wrote to memory of 3304 2012 cmd.exe explorer.exe PID 2012 wrote to memory of 3304 2012 cmd.exe explorer.exe PID 2012 wrote to memory of 3304 2012 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:3304
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5acbb6606ef44743331ade37f467b16fe
SHA1f8450fd0fbe57473400af4e574acb039a1c245a1
SHA2563a604893c13ef48950f68f5db40b1590f2f3ad69fa14d11b2c7280243093833e
SHA51213842e9d9eede7c21a542319c3aff03255df2d8bcf2e91a4b2753f8e0a5ea696e906889b46f4eecaa01643622e249736f18bdf7af653e80f9a9a3970953cb381