Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 12:15
Behavioral task
behavioral1
Sample
3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe
Resource
win10v2004-20230915-en
General
-
Target
3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe
-
Size
5.9MB
-
MD5
063048588d8d0e116e623f01a6560fcf
-
SHA1
9d33dd8b3dbcd23440c2d43809e1d3966b228766
-
SHA256
3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd
-
SHA512
698de36a35866ae2f84b12ceca19534bcaa932bb891412f7f5020113215f5a419e932260d22f286f0563992a60ca42f101d384d080d71786d649bd388fd51bc3
-
SSDEEP
98304:Jf2FZUY2ZEPh9Xp1Qf6uHzgfbMlEfDt3iMw6QSUMMj4xvMs27lVKssg2ZsUi0Kq:JyZv2ZMhT1LCzggeDt3i1M1MsClVK/gz
Malware Config
Signatures
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4504 systeminfo.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2480 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe 87 PID 4388 wrote to memory of 2480 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe 87 PID 4388 wrote to memory of 2480 4388 3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe 87 PID 2480 wrote to memory of 4504 2480 cmd.exe 89 PID 2480 wrote to memory of 4504 2480 cmd.exe 89 PID 2480 wrote to memory of 4504 2480 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe"C:\Users\Admin\AppData\Local\Temp\3d02ba5408654a587cceb372b5e3b79d740d40b81976ce8fac072549f5ae2cfd.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > "C:\Users\Admin\AppData\Local\Temp\\systeminfo.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:4504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59f54ca8af027475c5a9aaf6654455da5
SHA12eb247490bd721c9b6451089e70b37b742a184b1
SHA25670b3f560a757fb361416235f1089e106bad817e49f18f4c8007e9a9a67ac190f
SHA512ea378ada76095869a0a66733cd523e02bc9842584716a887eb1b465c89d20acc445b371b40138e925f6637e5d79a40d488a0f37edade86c382c9d5d84d89b5c8