Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe
Resource
win10v2004-20230915-en
General
-
Target
0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe
-
Size
812KB
-
MD5
002794162026df5f668c2314713aa656
-
SHA1
02722f1c46e9b1e532e24972527b6e002cf7f609
-
SHA256
0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac
-
SHA512
79c0a67309472b8dcef4061ae1abb33fec6013462df71b81d0d7fefce40d4978b55ba8ae53b580da56ddc37f584c71d7307b7ed16e178865d09a152c3757146a
-
SSDEEP
12288:oqmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:oqxtVfNDb31oT41+aneOrO4p2zMOZ/V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3768 1E0A0D0A120A156D155B15C0A0C160E0A160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2700 0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe 3768 1E0A0D0A120A156D155B15C0A0C160E0A160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3768 2700 0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe 86 PID 2700 wrote to memory of 3768 2700 0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe 86 PID 2700 wrote to memory of 3768 2700 0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe"C:\Users\Admin\AppData\Local\Temp\0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exeC:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3768
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD57689b1216dfc11c48d8fd41eb46da647
SHA10afb2940cb40f8af01148e65425dc4134a790992
SHA2561142dbf9be35e8f6fad0dbb28e209fb0b5801d9b6dd84c559f8cf528f09cbc85
SHA512574236c86340d346c451079c78af259133de5a571e83757d8d46824a154dca7dda1760612b39723a2fac9e025ff1406c5850912e6ddbe9cce764f5e962f5c004
-
Filesize
812KB
MD57689b1216dfc11c48d8fd41eb46da647
SHA10afb2940cb40f8af01148e65425dc4134a790992
SHA2561142dbf9be35e8f6fad0dbb28e209fb0b5801d9b6dd84c559f8cf528f09cbc85
SHA512574236c86340d346c451079c78af259133de5a571e83757d8d46824a154dca7dda1760612b39723a2fac9e025ff1406c5850912e6ddbe9cce764f5e962f5c004