Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
223434034f4c9170d9029caa31513f83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
223434034f4c9170d9029caa31513f83.exe
Resource
win10v2004-20231215-en
General
-
Target
223434034f4c9170d9029caa31513f83.exe
-
Size
301KB
-
MD5
223434034f4c9170d9029caa31513f83
-
SHA1
8723c9513e44207100af6e3cdfb98f453ff9fb4a
-
SHA256
5c8d0aeadea66a3cec5d08b56cab152ab337251b939746f387814a9bd48bb8b1
-
SHA512
d729d3c3b11eb0bb251fc2085a1c6e3bd5128df11c7717ff09ba67fabfcf1c54a7dc8c03c37c9d12a31d4c31ffefd5fff01dec324046b3e7242b6a097cf3821b
-
SSDEEP
6144:nE/zpnKcwGmy38ucSCqMoEcfBmnh7iXi7r2rT2c6boFb7Cdo2fOYO4:nEbpnnwGmysuckdBmYXi7yrT2lbddo2h
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3840 5048 223434034f4c9170d9029caa31513f83.exe 87 PID 5048 wrote to memory of 3840 5048 223434034f4c9170d9029caa31513f83.exe 87 PID 5048 wrote to memory of 3840 5048 223434034f4c9170d9029caa31513f83.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\223434034f4c9170d9029caa31513f83.exe"C:\Users\Admin\AppData\Local\Temp\223434034f4c9170d9029caa31513f83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\223434034f4c9170d9029caa31513f83.bat2⤵PID:3840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD53f7f6af3a6d92fba1fff022a5ce3adc8
SHA1dcbbf943be7d3936e41d5d42ae83ada9a53ae926
SHA256cc8a46abdb57123a23708e97e1e086cdb15ffda2ee45335d5951d172815ed4d5
SHA512c0d550a04362a91d9b1a6a3392a679768ea5b0b809651076ec43042e0d82b20e49153ba8497e1e778f1e6bc596810c66f02e29bf1191c6c65e9e4409c90fe280