Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
200026d00b9abff634357ed7cafc2ba3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
200026d00b9abff634357ed7cafc2ba3.exe
Resource
win10v2004-20231215-en
General
-
Target
200026d00b9abff634357ed7cafc2ba3.exe
-
Size
115KB
-
MD5
200026d00b9abff634357ed7cafc2ba3
-
SHA1
ef1801e1d8e03d9394e559d6af3c1234a6029e42
-
SHA256
e8072c8db7ee8a902ca5a675d7a943ff69362b70136ce8a1543b3d1223babd97
-
SHA512
28cabf28c3854658193754090362916a9b79b36a70772a6c38b060bb18fb0cb4e24a14a6a77891c78881a5f4f2ad5dbeeb02fe87701b49045af93a252a893c4f
-
SSDEEP
1536:iIqtjt4ZV6+DP5zybDozk0ZB7RkID9YyHAteIOPiO0HbDYISgR/kojnqVBGkQVjz:Dj6yWbifJJYyHsyHsxSgR/oVBGkuu4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 624 sxeB18F.tmp -
Loads dropped DLL 2 IoCs
pid Process 876 200026d00b9abff634357ed7cafc2ba3.exe 876 200026d00b9abff634357ed7cafc2ba3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 876 wrote to memory of 624 876 200026d00b9abff634357ed7cafc2ba3.exe 27 PID 876 wrote to memory of 624 876 200026d00b9abff634357ed7cafc2ba3.exe 27 PID 876 wrote to memory of 624 876 200026d00b9abff634357ed7cafc2ba3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\200026d00b9abff634357ed7cafc2ba3.exe"C:\Users\Admin\AppData\Local\Temp\200026d00b9abff634357ed7cafc2ba3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\sxeB18F.tmp"C:\Users\Admin\AppData\Local\Temp\sxeB18F.tmp"2⤵
- Executes dropped EXE
PID:624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD52d18987fdd86200d28939eb012ccd350
SHA16a059e04d6f427e8d8d066a0cec5fb67f3eea11c
SHA25675c757547875a0ae9b37e5ec848edd6abd2c7853a0561592fba9b9e1ecda5c3c
SHA5124d3dd4cda07b4ad911a7f3c3341983eddb27ca09c47bb34d7d7e6dbc437ee83c5ffa563e4ef460273f00ec46c9dff64d95b50740e34917a6a9678614436baf1b
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
164KB
MD5db2220d96fe94a8c18a08776d2f28484
SHA1422ce4e704342aa91278ae6f40e1ebe538824b9e
SHA25630aaffe141c6b1bbf9b3413da251ca0298bb89b381b1949511d3a0e29345557e
SHA512980713b604cb25abbaac267b2b458a11e6d3ab17901119965d7c46c5bf0eeb5705b12d9ecf85ac639f09601754e3e6e9696a4bf418bfce2662f3e59c55d16558
-
Filesize
162KB
MD5237e931ff68efd58ee9e4e0238b1e0fa
SHA1ce2bc77768dbe3b643585b7dd7d9d0198819865a
SHA2565ad0adce6643ad7db9468b855f378be6f09861531ceb7d3540f799fb3b0513e2
SHA512511048ecc09005ebfb9f8cf38bc2766676a11fd74b32bd8f10c1433404a3411f83923c0901a54921ea81cfa54d97fdf1c162858766bf473901ccc7b17e4c60c3