Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:51
Static task
static1
Behavioral task
behavioral1
Sample
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
Resource
win10v2004-20230915-en
General
-
Target
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
-
Size
2.4MB
-
MD5
ac7986b52bc828e71593f9ee004a8fb5
-
SHA1
3d16eb3d68d6d57795fc31c824586d73bdfc72c9
-
SHA256
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de
-
SHA512
e8a6c073ce831c9621131f82e3b13d7422d44980106fcc0697488f08a39ec3035556654c64638b9789d38763f6c16b67af158ffd098f8f3a51cec190ee56d6a1
-
SSDEEP
49152:wM6vlNPvJ4GCQGZ21C/pB+NmeMyPDbvyPgCLJxmY1YawKzPofGpsqq:P69lJ4GR1JNmxyPvggC3L1YaXsfOsqq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4504 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4504 4120 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 86 PID 4120 wrote to memory of 4504 4120 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 86 PID 4120 wrote to memory of 4504 4120 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\is-IONAQ.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp"C:\Users\Admin\AppData\Local\Temp\is-IONAQ.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp" /SL5="$50160,2233551,56832,C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"2⤵
- Executes dropped EXE
PID:4504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-IONAQ.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp
Filesize690KB
MD51305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793
-
C:\Users\Admin\AppData\Local\Temp\is-IONAQ.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp
Filesize690KB
MD51305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793