Analysis
-
max time kernel
149s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
4c87bfd3d74b17003a31d2e230ca0951.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c87bfd3d74b17003a31d2e230ca0951.exe
Resource
win10v2004-20231215-en
General
-
Target
4c87bfd3d74b17003a31d2e230ca0951.exe
-
Size
2.6MB
-
MD5
4c87bfd3d74b17003a31d2e230ca0951
-
SHA1
65a1d4c1e78d40c1357f4dd7bbe4f6d337553fb8
-
SHA256
947d26e4995eda1c27797a3323c574f51b4671e8b57a5c1501c841ec2cac4c40
-
SHA512
9e2810f35d6800919fed2f2671567079ad95e739cdc328922df05d00d796a3234472003d722776d20114b6588ae5bfa1d7380623e2c5aaa4ce0f738f4fbb1a28
-
SSDEEP
49152:5aHGuPbQSFu3mvVEHmmSRUUq2SEI0APh2knzLjfbTO9g4FY:QH15FRv5mBUUR8kb28
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2436 4c87bfd3d74b17003a31d2e230ca0951.tmp -
Loads dropped DLL 2 IoCs
pid Process 2436 4c87bfd3d74b17003a31d2e230ca0951.tmp 2436 4c87bfd3d74b17003a31d2e230ca0951.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2436 3488 4c87bfd3d74b17003a31d2e230ca0951.exe 90 PID 3488 wrote to memory of 2436 3488 4c87bfd3d74b17003a31d2e230ca0951.exe 90 PID 3488 wrote to memory of 2436 3488 4c87bfd3d74b17003a31d2e230ca0951.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c87bfd3d74b17003a31d2e230ca0951.exe"C:\Users\Admin\AppData\Local\Temp\4c87bfd3d74b17003a31d2e230ca0951.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\is-16OTV.tmp\4c87bfd3d74b17003a31d2e230ca0951.tmp"C:\Users\Admin\AppData\Local\Temp\is-16OTV.tmp\4c87bfd3d74b17003a31d2e230ca0951.tmp" /SL5="$E01D2,2501952,54272,C:\Users\Admin\AppData\Local\Temp\4c87bfd3d74b17003a31d2e230ca0951.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD59358a217880a48294e262ddb0b270653
SHA18449caed3b9f333ab902256e23cc7befe5619355
SHA2561c2039289bab0970649aa94578953f58b00cc466a9a26af71b2490f38bd3a94e
SHA512d05a31361e1a65f5a923e774485feb9ee4da488c85561c1ecf0ee8325cd6b828d4e5403be18dcc347bd85fdf6996826ceef6744b1b353e42d73b94dde605281c
-
Filesize
45KB
MD51fb5e9cce55a798d5302f3acf4c79789
SHA153e7320948d0616d405efcd18eb13c4bc892c2ef
SHA256de5abdb92c336019d609a4a572c3296cffee884e6324d3a0948f66718d869b69
SHA512068710110146952044ef7948246aa4a52fbcc71530c3a29ad90ee56db488a0ec6b622989f4804a667129190599c0c2f1012e065a521ed35fa9a3b43365096a66
-
Filesize
1KB
MD51a4bf7ba2791e8e3b71259d04f17dea9
SHA149d3bd575af9577732b6ed2454509a6345051521
SHA2566a60bdb940efe7f982daacdd18ce3100f6628788a0fca561c91b153d18feaaf0
SHA51267e9ca8608db80706a95dc17d37a786f849b821bdb3f3b45c6315c0f052fd746e02a5d3f8196550a23f09c2cbafee076e9e4243d1e968ccf25cc9ea9dfd62391
-
Filesize
47KB
MD563aa1abf6afd0900b154e8bf64c9aaee
SHA1ccc983ae4d2b153275a9308a79a3588b98a0a1da
SHA256f1046004d072f27f7d1316c95f35b0ee1f1e4ae9b1cdce0302becf2fb88d1101
SHA512621eb7d464edd0cd5e889401e5ed7ee1c980b634da6be0e544ed43759af467c582793218dc03c9bae81b75c8e8da58dfc6417b462f039df1e69a572204a9a4b0