Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:00
Static task
static1
Behavioral task
behavioral1
Sample
12daa984840c43edb9f28e97d8f5431b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12daa984840c43edb9f28e97d8f5431b.exe
Resource
win10v2004-20231215-en
General
-
Target
12daa984840c43edb9f28e97d8f5431b.exe
-
Size
552KB
-
MD5
12daa984840c43edb9f28e97d8f5431b
-
SHA1
2bd7d255aa348b43a0ccd13bdec9664d0778d690
-
SHA256
08c82a8c7dbc6ac5f2a206dee6de8ac7c3dc49fdb9a3b40706a48ff5ddd6f445
-
SHA512
7661a77548117884165a6b629b5a5e3dc89fe1c57cd32218093d9932c28c337d5abf6352fcda39d5480cab4f74f50be6d35a0a53a2d04a6c85b05b89cf1f9655
-
SSDEEP
12288:9d7N1+qnP61o9Rl/OOHYPK7GE4LzkqkuCnpTZtMN:9M+61o9fFhNqkucpTZtM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 RemoteAbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 400 2568 RemoteAbc.exe 96 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\RemoteAbc.exe 12daa984840c43edb9f28e97d8f5431b.exe File opened for modification C:\Windows\RemoteAbc.exe 12daa984840c43edb9f28e97d8f5431b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2568 wrote to memory of 400 2568 RemoteAbc.exe 96 PID 2568 wrote to memory of 400 2568 RemoteAbc.exe 96 PID 2568 wrote to memory of 400 2568 RemoteAbc.exe 96 PID 2568 wrote to memory of 400 2568 RemoteAbc.exe 96 PID 2568 wrote to memory of 400 2568 RemoteAbc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\12daa984840c43edb9f28e97d8f5431b.exe"C:\Users\Admin\AppData\Local\Temp\12daa984840c43edb9f28e97d8f5431b.exe"1⤵
- Drops file in Windows directory
PID:2312
-
C:\Windows\RemoteAbc.exeC:\Windows\RemoteAbc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 766552⤵PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 400 -ip 4001⤵PID:3216
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD512daa984840c43edb9f28e97d8f5431b
SHA12bd7d255aa348b43a0ccd13bdec9664d0778d690
SHA25608c82a8c7dbc6ac5f2a206dee6de8ac7c3dc49fdb9a3b40706a48ff5ddd6f445
SHA5127661a77548117884165a6b629b5a5e3dc89fe1c57cd32218093d9932c28c337d5abf6352fcda39d5480cab4f74f50be6d35a0a53a2d04a6c85b05b89cf1f9655