Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
4a11e97f37a27c92a5e3e1ff28323906.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a11e97f37a27c92a5e3e1ff28323906.exe
Resource
win10v2004-20231215-en
General
-
Target
4a11e97f37a27c92a5e3e1ff28323906.exe
-
Size
1.9MB
-
MD5
4a11e97f37a27c92a5e3e1ff28323906
-
SHA1
84b593264bb23274f9ac9a9776abf439487e6da4
-
SHA256
54ecd1e0b56fb0ff6598a9be5611d4d7b3a60deb434bdc793afbe9665a48cd83
-
SHA512
a6942f56662275c6be0ac54375404fc25a2a807e769ee1d16a30c6eace1d96e8152b5929b6dedcdcaaa0639f37f4498e47cb5a59fc676c3314319fd4412397b9
-
SSDEEP
49152:Qoa1taC070drhK2hAZa/75eEeZAczXIS9bg:Qoa1taC0OhR+6deEeZAkXIn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 748 8A3E.tmp -
Executes dropped EXE 1 IoCs
pid Process 748 8A3E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 748 4060 4a11e97f37a27c92a5e3e1ff28323906.exe 91 PID 4060 wrote to memory of 748 4060 4a11e97f37a27c92a5e3e1ff28323906.exe 91 PID 4060 wrote to memory of 748 4060 4a11e97f37a27c92a5e3e1ff28323906.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a11e97f37a27c92a5e3e1ff28323906.exe"C:\Users\Admin\AppData\Local\Temp\4a11e97f37a27c92a5e3e1ff28323906.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4a11e97f37a27c92a5e3e1ff28323906.exe 190D8C86F450414172D32F0F76A8E5AF422C25A577DBDBE183F1A9528573A18D0446C012025332CEC4FF8126C5FC2F65F694BCB1C1814859C82272164003184E2⤵
- Deletes itself
- Executes dropped EXE
PID:748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54d443251c4a32134f8fa06630600c899
SHA183998eb274ad82bc3452a30fc835211d148ed9cd
SHA256008e84602643a79bc3ed7706b649cf98a32461d0adecaeb7b10a5ac1cd59e8f9
SHA51253f1fe987bf99d40b801695df97724535d4541874383c04513cd58072a73d71d76c8f2f32997b5e782285cb0d0a19fde06a8bb6ff53d2564427a9cd7567afdce