Analysis
-
max time kernel
153s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:12
Static task
static1
Behavioral task
behavioral1
Sample
213bfff90fd4ce5c16f9296ad3f2a8b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
213bfff90fd4ce5c16f9296ad3f2a8b3.exe
Resource
win10v2004-20231215-en
General
-
Target
213bfff90fd4ce5c16f9296ad3f2a8b3.exe
-
Size
955KB
-
MD5
213bfff90fd4ce5c16f9296ad3f2a8b3
-
SHA1
aa263d8c75e75ec7017fd965136850d93c04e865
-
SHA256
055eee7aea85c7634cd7c6c250f246d46eea788778b0c4b516591063c27bbf46
-
SHA512
612b55dd62a9e1f67f356bb3c9801fc14de683dccbfd3e18180ead5a1ad380b886e549694ef607732bbd1a3ce9ba824dc36b329c468a7d132d8afdd6e4de8f4a
-
SSDEEP
24576:sv+MKaA19WFmO+vCZx2tPmHWs/wkMnwG/uUOVTRh29s:sWj19MmOyCyJmH7/w1nOVTJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2224 213bfff90fd4ce5c16f9296ad3f2a8b3.tmp 2416 213bfff90fd4ce5c16f9296ad3f2a8b3.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4312 wrote to memory of 2224 4312 213bfff90fd4ce5c16f9296ad3f2a8b3.exe 88 PID 4312 wrote to memory of 2224 4312 213bfff90fd4ce5c16f9296ad3f2a8b3.exe 88 PID 4312 wrote to memory of 2224 4312 213bfff90fd4ce5c16f9296ad3f2a8b3.exe 88 PID 2224 wrote to memory of 2416 2224 213bfff90fd4ce5c16f9296ad3f2a8b3.tmp 89 PID 2224 wrote to memory of 2416 2224 213bfff90fd4ce5c16f9296ad3f2a8b3.tmp 89 PID 2224 wrote to memory of 2416 2224 213bfff90fd4ce5c16f9296ad3f2a8b3.tmp 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\213bfff90fd4ce5c16f9296ad3f2a8b3.exe"C:\Users\Admin\AppData\Local\Temp\213bfff90fd4ce5c16f9296ad3f2a8b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\is-P09HM.tmp\213bfff90fd4ce5c16f9296ad3f2a8b3.tmp"C:\Users\Admin\AppData\Local\Temp\is-P09HM.tmp\213bfff90fd4ce5c16f9296ad3f2a8b3.tmp" /SL5="$A0066,695665,81408,C:\Users\Admin\AppData\Local\Temp\213bfff90fd4ce5c16f9296ad3f2a8b3.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\is-MGTP3.tmp\213bfff90fd4ce5c16f9296ad3f2a8b3.tmp"C:\Users\Admin\AppData\Local\Temp\is-MGTP3.tmp\213bfff90fd4ce5c16f9296ad3f2a8b3.tmp" /SL5="$C004E,56149,54272,C:\Users\Admin\AppData\Local\Temp\is-P09HM.tmp\213bfff90fd4ce5c16f9296ad3f2a8b3.tmp" /SL5="$A0066,695665,81408,C:\Users\Admin\AppData\Local\Temp\213bfff90fd4ce5c16f9296ad3f2a8b3.exe"3⤵
- Executes dropped EXE
PID:2416
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD57415710f1846e7249d4bc4d85295eff1
SHA136c8cd5a3e3a49d39dbe57271766a105a2ed7ce7
SHA25650827efcb07e93c17f471a2ef87a104dc1596f19334ebc77180fe08ae55e383a
SHA5128b79191758ad654e9e080efa608139355c14494dcc2a1350bb7d0912baa834f434f9236e627ce939d4c187cd3d3a2719e67b8d6fc4a098c6a38b37c10eb95a3d
-
Filesize
292KB
MD5d0e54e9c7cea8eb2e371077261a645c9
SHA1ea5f3078ea07c5009fca54b8b9930f21c364e006
SHA2564c3ce6ce98c04346e046de8efb303c85d8e4f30bb8406efdd880476660f2550d
SHA512a119ecef15e6c84bd6664dfb6df618e5194b3385c0381ea5825739755ab633e8d1f1cdcfaa5848a66a1d670cd37a8955ef5ea6a92de7285e21a35e1821af3eff