Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
2ce1be10468ee7b3142866d278e3681d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ce1be10468ee7b3142866d278e3681d.exe
Resource
win10v2004-20231215-en
General
-
Target
2ce1be10468ee7b3142866d278e3681d.exe
-
Size
815KB
-
MD5
2ce1be10468ee7b3142866d278e3681d
-
SHA1
dbad333695fb6d8c4a4bd3e5e10ea900bc499ef4
-
SHA256
5227e4020d279aea78aa1c54756cbeaa1da3b58768f1d63d8ff8614b79632ad7
-
SHA512
429a9f972f910fa6277e7012d52ca98f4a8fb1398d86ed1d1a4b004b4420c1c4a45c2f38e6051e77057ee5758f1d7fb801de1dacfe290d45b2cca7b8adfbdf0a
-
SSDEEP
24576:5naMlSUWQEG6lmWqaJpDOl27kS3rJQBtUkBgJ:5aeRLE1lmxkDb3inXBgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2560 2ce1be10468ee7b3142866d278e3681d.tmp -
Loads dropped DLL 3 IoCs
pid Process 2560 2ce1be10468ee7b3142866d278e3681d.tmp 2560 2ce1be10468ee7b3142866d278e3681d.tmp 2560 2ce1be10468ee7b3142866d278e3681d.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2560 1236 2ce1be10468ee7b3142866d278e3681d.exe 88 PID 1236 wrote to memory of 2560 1236 2ce1be10468ee7b3142866d278e3681d.exe 88 PID 1236 wrote to memory of 2560 1236 2ce1be10468ee7b3142866d278e3681d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce1be10468ee7b3142866d278e3681d.exe"C:\Users\Admin\AppData\Local\Temp\2ce1be10468ee7b3142866d278e3681d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\is-CT235.tmp\2ce1be10468ee7b3142866d278e3681d.tmp"C:\Users\Admin\AppData\Local\Temp\is-CT235.tmp\2ce1be10468ee7b3142866d278e3681d.tmp" /SL5="$D01D2,444870,54272,C:\Users\Admin\AppData\Local\Temp\2ce1be10468ee7b3142866d278e3681d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD5017679f0dad58914189686c6b4b9f4ec
SHA1bedb74cb4af134ae2c4119e23db2c8aeb7deceae
SHA256506f76919bd7c353e9c83218cbd40282987ee8d51bde3c346f56eac9ee15df8c
SHA51292782ac8d23d2e782d8106c8f692c219d6948582069891337971c03a0e939ca49cae9efec965e81976c08b5ff5a3b92e0206eee3eaa3bb9c3dccf1718103328d
-
Filesize
19KB
MD5cebb4fc960edbe6b350f483d9eae91bc
SHA12101970a2210b9fc6d028f3f8f5754aeb9e56ab2
SHA256aacb761a39d6d24174050161c0bd1b36be13f9fac170f5cc72af3055ec743653
SHA512f961cba780d0e5aefb45ec4ca086872407c92293fee4a819ac602943197e655d0b9f5563a70b6d83c16a4bb11c8fdfd4e39d4855e6fb15d8f597f6ca97c328af
-
Filesize
101KB
MD531ef550e57d7650f34085dc5516d939f
SHA17903fc7de792be87cca2c480b2333e6236c43c76
SHA25663a4fe1a4d4e1e1bd13e9ad408fd100042e29d6152c8b23fbddf7d943e90fa88
SHA51270b27d6a9bec9ef9bfb200b7392f76c5474246d0ef0d59484a3760adf10b731d82c01c5ce05ca2b190791ce3ce41dfa06c6f3ffe422707af83981a98cb77acca
-
Filesize
146KB
MD5a845e9855093eef0121b5a479c5dda40
SHA164dae767b9a0be5655d5df3256dce7242fd06d30
SHA25628af01f1289a39b28b96d28553c3222270a03e396c42179add71a2617513ccc7
SHA51222f8a50a91ef0539f5c029935c25dd71e2df2bc6470845ba1217c7f17e5c4a8201d73f8fd8e864a75e0638c0dbe33cce9201d455734bf59cca413360bc3f5705
-
Filesize
111KB
MD51870a90f268c3ef1f4fd6a67103a9e16
SHA1f5ef3dad349c48de0be8af49de7819fdc16c821c
SHA256afcd879f0bd214c44f192d14cc9c914d71140ef35461c9a01bb48f4a1b7f495f
SHA5129434cac733676827d8ec7219ee6be0db3308bb3a47039b62cd643f0a45b29f7fd5ca36c980f682c8ab8968a5e64332a70112aebc1e36b33bb799d5cad8b54645
-
Filesize
156KB
MD5761acdddd621ca402bed24a78dfbe28c
SHA1fdb5a09df4087481daf88cc86be0635ed2471a88
SHA25661f9236f05c7ae1dc0ba759216797ac92810f1270fe721577d56e4926d384470
SHA512b2def8e3ca0a6994a552a6067fa9dc13402f0252a11f070e2f5a439a5a7256d9a19129fd30d12c3ea6d3a8fb5245970480174bb012211ee12c72afd7dcf1b6f3