Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
848082b000d6a57c6c3cdfd27b075ad2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
848082b000d6a57c6c3cdfd27b075ad2.exe
Resource
win10v2004-20231215-en
General
-
Target
848082b000d6a57c6c3cdfd27b075ad2.exe
-
Size
1.9MB
-
MD5
848082b000d6a57c6c3cdfd27b075ad2
-
SHA1
2ef5e73636bf290fa0e826d2b11da90db7be9613
-
SHA256
267e84dfedbdf788bb07797fa572708f01cb280bf077f821545e1ef8e21b6e2b
-
SHA512
09f2c1f513cab5b9f0c6362fc0c82413df15330e87b13a3ba9b497af9fda5f1cadafdcc6196e46664ff1933c492094f020aab15bf118d79ac1fdefd214e1c5d3
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dXxLJqonIhL2t42qc4mFP+WFZRaW0gmvM32qO:Qoa1taC070dhO2t42q6+kZUp42P2ZtWr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 624 4287.tmp -
Executes dropped EXE 1 IoCs
pid Process 624 4287.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 624 4080 848082b000d6a57c6c3cdfd27b075ad2.exe 92 PID 4080 wrote to memory of 624 4080 848082b000d6a57c6c3cdfd27b075ad2.exe 92 PID 4080 wrote to memory of 624 4080 848082b000d6a57c6c3cdfd27b075ad2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\848082b000d6a57c6c3cdfd27b075ad2.exe"C:\Users\Admin\AppData\Local\Temp\848082b000d6a57c6c3cdfd27b075ad2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\4287.tmp"C:\Users\Admin\AppData\Local\Temp\4287.tmp" --splashC:\Users\Admin\AppData\Local\Temp\848082b000d6a57c6c3cdfd27b075ad2.exe F4DD3FABE47AFBF5D100F7AB4D39C126268B0728EABF01B712E46031DFBB625D0BF6DB61CA29C342139C4EA714F21D4E7152830548D0196112C65D96CC0FC79E2⤵
- Deletes itself
- Executes dropped EXE
PID:624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5e9e51b87d156d3c3479945fcd5575f6b
SHA1ba1e11c2c644d3a78d7074929649d9b00d621d26
SHA256e6ed1d1fdc99514d70907248e53582efcca0539944845ecf4ae343d5add57742
SHA5129c6210d44e99eb29d0f4c38fa3f00613210d58d964f88da3ef67a29130d55584fae8b2672805b33c36ca9bb36b84f36e19fff9a8b66167220c332b1e8443a158
-
Filesize
75KB
MD55b357b80c296d425b78f4ad505f84df9
SHA1d60661d40a6a995c550929dbe2b618c3f8cca0e3
SHA256d24b94ee28b6597ef3f7124f97fa0b2a4532c17bc64222bc8e33024492286221
SHA5123f320f00207c6a14a2a8580017ce7b498dcdcc82515922eb4dd8e54af1f81de95982aba67bd1b7b8ee405bc53bf5b096346e55902e81313d749433a2feb7443b