Analysis
-
max time kernel
160s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
23816487a769ad1946bf743f67a999b8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23816487a769ad1946bf743f67a999b8.exe
Resource
win10v2004-20231215-en
General
-
Target
23816487a769ad1946bf743f67a999b8.exe
-
Size
1.7MB
-
MD5
23816487a769ad1946bf743f67a999b8
-
SHA1
262081c228923adc97b4b326453353423c84215e
-
SHA256
e8bf6e783382494dfe80f2703e70b8063efc285147fdf743d486ed9f96af870a
-
SHA512
b008a0b4d3f86435ac25c602eeba50aa07bde9fee8e1b228dce56ea7670f16eded7ea1d5a2b6697da9b3223aa90f266b994cad291f53b94d0bb9ad12f2f748e2
-
SSDEEP
49152:5anqPlLjWr4Tq5BsvSpzEKFWyuKS4OcLUUrdTO9g4FY:QqWr4yjDFJuKCcoD8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 23816487a769ad1946bf743f67a999b8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1408 1884 23816487a769ad1946bf743f67a999b8.exe 87 PID 1884 wrote to memory of 1408 1884 23816487a769ad1946bf743f67a999b8.exe 87 PID 1884 wrote to memory of 1408 1884 23816487a769ad1946bf743f67a999b8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\23816487a769ad1946bf743f67a999b8.exe"C:\Users\Admin\AppData\Local\Temp\23816487a769ad1946bf743f67a999b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\is-P82LF.tmp\23816487a769ad1946bf743f67a999b8.tmp"C:\Users\Admin\AppData\Local\Temp\is-P82LF.tmp\23816487a769ad1946bf743f67a999b8.tmp" /SL5="$701E6,1387283,54272,C:\Users\Admin\AppData\Local\Temp\23816487a769ad1946bf743f67a999b8.exe"2⤵
- Executes dropped EXE
PID:1408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD5c080f73b1bdde0853cb0258d9a02b0ec
SHA1a5112a53e6e75069ac06b7bbd658f7cf2c8f2dee
SHA256a0cfbc8da39ad4a4d21c61d73873d225ffa5d7650fae5938ab643f719d5f7363
SHA512e514be3f983de22c0f67bac318686b7fe75cb6fd9832f3603077ad25c559155b7df71555b92bb6366835a104c8d2828cec2766fb7f855bd3f79f66319d6a5eac