Analysis
-
max time kernel
142s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe
-
Size
22KB
-
MD5
24852ba8f2d0ddccfa1ee6aa0f6d0e1f
-
SHA1
d5433ddd108c0c697e8cebffb3e485b230a293ac
-
SHA256
aa4726cc4242b0cce996f0cae00f05df712601513343d042f8760f736e4f1932
-
SHA512
4121fe420ccb88b69100e25e685a50c9312d0e0fcbc2c70d4c0cd64462ad9d8f2d7fcfbf40eb83602c71b5fd41075934167ff3d0fe6197d5d4df32a108f229af
-
SSDEEP
384:GWH0C2vDWRXhNnK612+9MWvPteE+d3VdKgHeSzdYKWke0yR74CCAklrqwF8/2snY:iC26nNNYLvKgHxwZ+CCHYwFpsnTbgtF7
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 alitin.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\alitin.exe 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe File created C:\Windows\SysWOW64\alitin.ini 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe File opened for modification C:\Windows\SysWOW64\alitin.exe 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3136 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe 3136 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe 2668 alitin.exe 2668 alitin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3136 wrote to memory of 2668 3136 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe 19 PID 3136 wrote to memory of 2668 3136 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe 19 PID 3136 wrote to memory of 2668 3136 24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe 19
Processes
-
C:\Windows\SysWOW64\alitin.exeC:\Windows\system32\alitin.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
C:\Users\Admin\AppData\Local\Temp\24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe"C:\Users\Admin\AppData\Local\Temp\24852ba8f2d0ddccfa1ee6aa0f6d0e1f.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3136