Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 12:36
Static task
static1
Behavioral task
behavioral1
Sample
18bad8c9b9f503947371b3c3dec30c85.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18bad8c9b9f503947371b3c3dec30c85.exe
Resource
win10v2004-20231215-en
General
-
Target
18bad8c9b9f503947371b3c3dec30c85.exe
-
Size
1.9MB
-
MD5
18bad8c9b9f503947371b3c3dec30c85
-
SHA1
af68a6d330c6744a0d7f888567c484cddb2b27b3
-
SHA256
f0edd371938cacc185a3fe79762a84bb098657982b2c567c9baa463bba5d8842
-
SHA512
dc301376cae3ab491c39a44902cb58433830cf62a5173513f7d26e2a88ff63176b6ccd83e52342a541180afafcf252d63258671ea7eca6c28d65570552b7d2d2
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dxtUiOb473eyTHS+hV7A70PduYDB1RNZ:Qoa1taC070dxtUiYilTHS+hhAuDB1RX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4308 8A8D.tmp -
Executes dropped EXE 1 IoCs
pid Process 4308 8A8D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4308 2328 18bad8c9b9f503947371b3c3dec30c85.exe 91 PID 2328 wrote to memory of 4308 2328 18bad8c9b9f503947371b3c3dec30c85.exe 91 PID 2328 wrote to memory of 4308 2328 18bad8c9b9f503947371b3c3dec30c85.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\18bad8c9b9f503947371b3c3dec30c85.exe"C:\Users\Admin\AppData\Local\Temp\18bad8c9b9f503947371b3c3dec30c85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\18bad8c9b9f503947371b3c3dec30c85.exe 9C77BDB4E364E0E6CEFCF0E3D5F991EE6ED36855440BFCD6BD8F0C1B7E1A33A1ED75254A53CC1090B099BA1BDA461A759AFAA53896DD74DABDC764BEEA859F852⤵
- Deletes itself
- Executes dropped EXE
PID:4308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5da9c1a94456219ccbbe93a521ff759a3
SHA11cc4fa9feccbf043269e326cde4199104559ead9
SHA256a6aecad952bc85fd32aeeaf92344806b52284c5276e5bec4b2bbec0e1f403e52
SHA5128c7fa0f07e3a476a8086addd877336b37913d715a1ba6656bd99f82d2c8d3d1ae40fe3f4b0ace02545dcbf3acb28d2ef1ccfe228f41a7c87de1a83beed3d26a0
-
Filesize
1.4MB
MD5d767ad5356d5db2d724a3802bd1219cc
SHA1a0d4a2fc3928cc25db17d755ad257490cb34b924
SHA2561d62916de75eb6ecc9051197e7f569a0d78ea53084860a9b2897b669014f4f27
SHA51251d1df606c58a0570ce1d4d96b8e98c4465eb17862e144fd078cba5cae7ce252cff258344a6d64efcc95babb24b8fda4816bd782a03e0df5e0a1f2b8ca469809