Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:45
Static task
static1
Behavioral task
behavioral1
Sample
05ff68340f922b2e1ff07d4060d30aba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05ff68340f922b2e1ff07d4060d30aba.exe
Resource
win10v2004-20231215-en
General
-
Target
05ff68340f922b2e1ff07d4060d30aba.exe
-
Size
385KB
-
MD5
05ff68340f922b2e1ff07d4060d30aba
-
SHA1
32f53e230ddb7acda9c6c13e4723a957489930a7
-
SHA256
36ee9d0f917f7b01cc2db6d875f23f707eab739accdc0019a1695ccffeab7614
-
SHA512
19f2e951495c89ba917966215ad985ec15028e42258ab73c612beb19f9be79c78656d2b4d6d2904deb803712495a92772472ee5330a73a037e567d47a8ca0c93
-
SSDEEP
6144:Wb57P0UHF2idZecnl20lHRxp3g9TDe/bwgBt1bo7Hk4jpgjY8jBkFIM6HAAg:WFg6F3Z4mxxhUe3ajec8VFgJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4440 5084 05ff68340f922b2e1ff07d4060d30aba.exe 90 PID 5084 wrote to memory of 4440 5084 05ff68340f922b2e1ff07d4060d30aba.exe 90 PID 5084 wrote to memory of 4440 5084 05ff68340f922b2e1ff07d4060d30aba.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\05ff68340f922b2e1ff07d4060d30aba.exe"C:\Users\Admin\AppData\Local\Temp\05ff68340f922b2e1ff07d4060d30aba.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Users\Admin\AppData\Local\Temp\GKEY02125487.jse"2⤵PID:4440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5d0b991db1a13ea0769ce2fc6cb782f6a
SHA16ddd86560bbe0302ac0ac057c5f2be07c8e6b273
SHA2567f1ef7c298975cb73a49a59b9a7ca2a98aa21266e1b2c68798917d3acf5092c4
SHA51217d77d41ea3234289e25814e77fea5f103aae04ccda03fd942d63e013a0f4572a1d03470d22b042ff62f13a1c29cc6ce710325833bfe7fb284071af927b73a12