Analysis
-
max time kernel
145s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
301e9200aa3043cb4167acd4721d790f.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
301e9200aa3043cb4167acd4721d790f.exe
Resource
win10v2004-20231215-en
General
-
Target
301e9200aa3043cb4167acd4721d790f.exe
-
Size
1.9MB
-
MD5
301e9200aa3043cb4167acd4721d790f
-
SHA1
82cb911f8ba3649d5436ff56165911b81bba28d8
-
SHA256
ea382e1fad4c868f8783caf957a88938d93d129fa67f5ee80978dffe5857b3f0
-
SHA512
ada0ece9fa9d8926118652a08b745447f8d9034f6a40d8d8be49fc739f289df83efa93ae7a37f52009de1e33f818a5950a6a34c9ee0b80f3781153b3d09cb67f
-
SSDEEP
49152:Qoa1taC070dDiJNas1oIvBHr3LiGXJlsYxhvf9LuvaQ:Qoa1taC0Jas1oIv5jmQHjh39LWaQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 A662.tmp -
Executes dropped EXE 1 IoCs
pid Process 2332 A662.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2332 4768 301e9200aa3043cb4167acd4721d790f.exe 90 PID 4768 wrote to memory of 2332 4768 301e9200aa3043cb4167acd4721d790f.exe 90 PID 4768 wrote to memory of 2332 4768 301e9200aa3043cb4167acd4721d790f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe"C:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp" --splashC:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe 13FD2A5A1FF66454129BC9F72F366F522B60D26E6E659271E14722E764176D3CD48ED1C49F1ACCCEA228044F5ECD3E4D7099F2BD963E43D3CFB87DEAD13D38622⤵
- Deletes itself
- Executes dropped EXE
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c7fbc76e6b94ffebaa5bb35ac55bbcae
SHA18b9928edb097b4cef901fd490249f570bfb29c42
SHA256ece0bc39be60262b01ee573a176b952d2d9c887d11b1e4c77759bb9945357496
SHA5126e0f1373b04c6c16a645883abac557bd5a2793be772d5a56203340d8db20a7cfaa08fab875dc78520a885ffa0c63b22e43b5b968cff9839d81bcd4dd2f92e003
-
Filesize
1.0MB
MD5d903551afb13770ca87babfd47d8e9f9
SHA17276c1c70b21352783bfb285fb74722a1d159519
SHA25606f48e7e7bf48b95e3ca8d3cd8b5fdaa64134b376739472b1c85dd2a0005f4fd
SHA51239e9c05c9e861291e706d62da8151581c0fd4aebd8da9306934778beb61c7af54c6f6b375a0ae975552336d6eb1bb4b03d8022e7bf0ee8581f445c432c464e83