Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
2d4a80dfa4c44a8d3125974b7bf48b7a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d4a80dfa4c44a8d3125974b7bf48b7a.exe
Resource
win10v2004-20231215-en
General
-
Target
2d4a80dfa4c44a8d3125974b7bf48b7a.exe
-
Size
785KB
-
MD5
2d4a80dfa4c44a8d3125974b7bf48b7a
-
SHA1
c679567ca797fefb81282045a4f5563e116255d5
-
SHA256
5eae470c2b30f4203cf5a913b6346cabf203ceb353530a02560a744ff71c1754
-
SHA512
0b3765010fbbbe9361cbba18418a21b5ac9f7883d8fa88e7f0caaac16541d73b08093b530dc48b5a9ce81b7c5d32c9a70694fc1843a99cff9d17ed0619e77b3b
-
SSDEEP
24576:goSjqZc/LuP00KrZCrKZAF4rawsiQrGR0S2:goS2ZYqPjKrcrKSFX9rGRO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 INS6F25.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2884 wrote to memory of 4788 2884 2d4a80dfa4c44a8d3125974b7bf48b7a.exe 96 PID 2884 wrote to memory of 4788 2884 2d4a80dfa4c44a8d3125974b7bf48b7a.exe 96 PID 2884 wrote to memory of 4788 2884 2d4a80dfa4c44a8d3125974b7bf48b7a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4a80dfa4c44a8d3125974b7bf48b7a.exe"C:\Users\Admin\AppData\Local\Temp\2d4a80dfa4c44a8d3125974b7bf48b7a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\INS6F25.tmpC:\Users\Admin\AppData\Local\Temp\INS6F25.tmp /SL3 $11006E C:\Users\Admin\AppData\Local\Temp\2d4a80dfa4c44a8d3125974b7bf48b7a.exe 796575 799988 614402⤵
- Executes dropped EXE
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD599fa571a302c7e8ed49d149c1c700623
SHA155f36c6868d698cf9f4b84296b51737b34d014d0
SHA256d2e9c5966937beadba64d89d3ce31212c61a85118d9662adb98fdeac1ad6eb44
SHA512f14a45f0cf8b338efa4371ca88767189cce8ef919aa7c691ba7105a393acaf07b43721f2a74417075aa99acea875cc5de4c7a09fd38dad6f913b9a675c0ddec0