Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
8119840f0b1af24f6c6d5db98c8ed045.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8119840f0b1af24f6c6d5db98c8ed045.exe
Resource
win10v2004-20231215-en
General
-
Target
8119840f0b1af24f6c6d5db98c8ed045.exe
-
Size
1.9MB
-
MD5
8119840f0b1af24f6c6d5db98c8ed045
-
SHA1
970c9ce198296873fc8cd227f15447bc1173b009
-
SHA256
02f34b43d6134a162fafac250913596fd374228ae36fc0f6f78bc6506cf9b40d
-
SHA512
9e66c9eac48ff20e2d3154eeb4f33d3a806970974768290101b4dfc723476404399e8cc941fb541312dc9d0c5b6d1a0ebb96dfc7810e8c622c9ce3708e8457b2
-
SSDEEP
49152:Qoa1taC070dXCZNmC58K7xXqEW4gcIP/Mubo:Qoa1taC06Cj80xXq9F8ubo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 348 416E.tmp -
Executes dropped EXE 1 IoCs
pid Process 348 416E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 348 4416 8119840f0b1af24f6c6d5db98c8ed045.exe 41 PID 4416 wrote to memory of 348 4416 8119840f0b1af24f6c6d5db98c8ed045.exe 41 PID 4416 wrote to memory of 348 4416 8119840f0b1af24f6c6d5db98c8ed045.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\8119840f0b1af24f6c6d5db98c8ed045.exe"C:\Users\Admin\AppData\Local\Temp\8119840f0b1af24f6c6d5db98c8ed045.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\416E.tmp"C:\Users\Admin\AppData\Local\Temp\416E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8119840f0b1af24f6c6d5db98c8ed045.exe 76EB93304A11B3AD1B120D52B6233A1E1B8CB6BE7B2CD8F0E427E2062318B68D8638B1DE83386F95CADA297A2367E7F5ADC87219E253BD6F61C625AE647AB7202⤵
- Deletes itself
- Executes dropped EXE
PID:348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5ee7d2e9bd19b086ddd0d4424772f0aa2
SHA1468b171e8c031703db4c42441c60648459736aaf
SHA256bb52e74f749d8b7429939ae1e55c735a2f2bbe966e4f6f6bcc28c603fd7e3505
SHA5123c0aad0636ef18772b044ec069696ce0a75b7a4802dbe01773eca8ad2460605c5c5ac39e858655922290270e6ff868f11735a0582ec9b1d13b57461995131fdb
-
Filesize
314KB
MD547c5ffacff14af577762c12ed5447f13
SHA17369080cf287dcd12baf26f7ded528aac27e9b3b
SHA25616d9c2823564024d623c18dfe5dabfe20701849eebeefc86d30ddf115777642d
SHA512b72f69c84de2efa3fd8db79a21aff44dd775e5685c0e103da20e83fe26b6dad70ded96d78c6e3320087ec2f6754577aba62783f7517ec6413e07ea0faf9ec035