Analysis
-
max time kernel
134s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
4acf8dad62d23335ad3598514f058639.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4acf8dad62d23335ad3598514f058639.exe
Resource
win10v2004-20231215-en
General
-
Target
4acf8dad62d23335ad3598514f058639.exe
-
Size
80KB
-
MD5
4acf8dad62d23335ad3598514f058639
-
SHA1
454d4b4e3a09770bfb8ba5a436d66ba3ff11a81e
-
SHA256
754f7bd3b25bc9177186cddd538a602622fed637cf437d2f17d0c83f5544543f
-
SHA512
9f5be1d54598a3850196d263484210fa868d7e81d767816bd307ded6993226b3d7320b62cc6344dc79e2632094ec30f6d021b5883d924c13b801d9b539e94d40
-
SSDEEP
1536:PKlf7rQLhr6d3S+g02YpzubeuO2ifJivztemEVQfh19eg+QxWBjwce1lQEWUEdw:P47NS+phbupgQvztjfNegTxW2EEqq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4332 1180 4acf8dad62d23335ad3598514f058639.exe 89 PID 1180 wrote to memory of 4332 1180 4acf8dad62d23335ad3598514f058639.exe 89 PID 1180 wrote to memory of 4332 1180 4acf8dad62d23335ad3598514f058639.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4acf8dad62d23335ad3598514f058639.exe"C:\Users\Admin\AppData\Local\Temp\4acf8dad62d23335ad3598514f058639.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\vfvxvdaqk.bat2⤵PID:4332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229B
MD53d1f24ab267b45fd662693112fba57be
SHA13ab5918c462945e85b8ffd40a450268abf8f96ac
SHA256f78e881723601f511f2e53d2696e648ed1e90deca0206f533f20298868050bfa
SHA512abbc8c457ef0c5106f8a349c9af884eb8ac789ccc8c0f4319ee31620ff3148d9ea9ad1b0ca0956c4610bcf3c5a755531b2cfb39c7ec6bb830a03576f00ebf010