Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
283b951dba1be256a514056e2ca5a44f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
283b951dba1be256a514056e2ca5a44f.exe
Resource
win10v2004-20231215-en
General
-
Target
283b951dba1be256a514056e2ca5a44f.exe
-
Size
289KB
-
MD5
283b951dba1be256a514056e2ca5a44f
-
SHA1
c6838d78274dd1dec0518e79ff9a811d72edc730
-
SHA256
9225019bdd9a14f0f4e0488853a34f54576114f6f10946133f93f0758367024c
-
SHA512
2ec81447e54f2544b605e79cadaa648ceba250101a39ff83a3f948c09bf13ecf7dc64ec377774ac0d18ebc6e5451778967c45674955abdbe56d78495ec105ec1
-
SSDEEP
6144:1MsYOtd0Nrh0cGq51NMkPpAmYLIF2JfooZVJeWRAo2qc/KW:1j5/0Nl0cGqv62An0Mvx7AoJm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1108 220A.tmp -
Loads dropped DLL 2 IoCs
pid Process 2544 283b951dba1be256a514056e2ca5a44f.exe 2544 283b951dba1be256a514056e2ca5a44f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2544 283b951dba1be256a514056e2ca5a44f.exe 2544 283b951dba1be256a514056e2ca5a44f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1108 2544 283b951dba1be256a514056e2ca5a44f.exe 93 PID 2544 wrote to memory of 1108 2544 283b951dba1be256a514056e2ca5a44f.exe 93 PID 2544 wrote to memory of 1108 2544 283b951dba1be256a514056e2ca5a44f.exe 93 PID 2544 wrote to memory of 4536 2544 283b951dba1be256a514056e2ca5a44f.exe 94 PID 2544 wrote to memory of 4536 2544 283b951dba1be256a514056e2ca5a44f.exe 94 PID 2544 wrote to memory of 4536 2544 283b951dba1be256a514056e2ca5a44f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\283b951dba1be256a514056e2ca5a44f.exe"C:\Users\Admin\AppData\Local\Temp\283b951dba1be256a514056e2ca5a44f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\220A.tmpC:\Users\Admin\AppData\Local\Temp\220A.tmp2⤵
- Executes dropped EXE
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\283b951dba1be256a514056e2ca5a44f.exe"C:\Users\Admin\AppData\Local\Temp\283b951dba1be256a514056e2ca5a44f.exe" --cp "C:\Users\Admin\AppData\Local\Temp\221A.tmp"2⤵PID:4536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD56495f1a2e4311741335ff7d1e3983767
SHA1b3290e1664120a876c278dc7c7fc6d339b819378
SHA2566b5ab6952e5ddf29ae428411d6dec8a754ef44739839ba44185fb374e92ffb70
SHA51278439f0b62942d40c68ac52d47c468e5144d8e873645ac93f3c9b8e2ad1bdb295d8a9a2e2fd26b6bfcb7a7aa06a605dcacecc604ef1e53f95bf5f9f59a4acfb9
-
Filesize
289KB
MD51c4a2f2e21853427d471c45798db829b
SHA18460b01a2e5ff09cbb9d42045f4e982f5fcdbff0
SHA2568b09924fab44fa26eac8ab81100669826ece82a7a32f7a73b7f07d777ec61cab
SHA512e4949e42f2091a5114140177a4b620d081def75eb0f4a91142c3845c6bb5dd4dd50aada6a470ff564f696d1e023a9d9b76939fb93ea89ac0adc0dcb18b488b99