Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
4adae56931eeca8158436ca6bde89f97.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4adae56931eeca8158436ca6bde89f97.exe
Resource
win10v2004-20231215-en
General
-
Target
4adae56931eeca8158436ca6bde89f97.exe
-
Size
1.9MB
-
MD5
4adae56931eeca8158436ca6bde89f97
-
SHA1
c82514c2c61118a2d34c296adaa46ac5c0057f65
-
SHA256
1f11415adb2645dda899d994c408249051c90ed275e67639f88c46f8d9f5a767
-
SHA512
759f6c524f76a6263006e12638fdc134285110dd99ed4c995b43cfffce8102e6c238b6a1d2e1a6b0ef6b335a38c2469cb6c2f088b2f4c0dab84f66c39284cda6
-
SSDEEP
49152:Qoa1taC070dleuU7aA99ICX1nYcZq5vEe2A:Qoa1taC0Y36MCX1nq2A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3972 6EC7.tmp -
Executes dropped EXE 1 IoCs
pid Process 3972 6EC7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 3972 212 4adae56931eeca8158436ca6bde89f97.exe 91 PID 212 wrote to memory of 3972 212 4adae56931eeca8158436ca6bde89f97.exe 91 PID 212 wrote to memory of 3972 212 4adae56931eeca8158436ca6bde89f97.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4adae56931eeca8158436ca6bde89f97.exe"C:\Users\Admin\AppData\Local\Temp\4adae56931eeca8158436ca6bde89f97.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4adae56931eeca8158436ca6bde89f97.exe F54571357CEFDA297FB3CAB81B91589976A1744C7F8D75E36AC22ED8D893996188C316984D8C7BFD1A19D1C6D97B7A84E7ACF61FF34EB3B86CF3CABD1B456B992⤵
- Deletes itself
- Executes dropped EXE
PID:3972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD525da8b68f9980ad86186f96e9a5d97dd
SHA16b736dba1f7e882b6354e9dde289397c552e6f41
SHA2568ec7f7e04c4cf1ef261d2be945fc3dc9417cde4048d879bebce339cbd3839586
SHA5126d218f999a838951c860306c6c788be4b9032ba1e742683346d811a9a5203876a4872892a8be7a8ec4c97827eebe7c6276ed0e8fc8808c708b5b102099120f71
-
Filesize
226KB
MD524da0e7adb5780e44b843ef00b2bbb44
SHA162478f822c594eb4ed5b97cae3dab3fb9b359650
SHA2567291011b4faebe898cb4b6517dff1d1f02541d096aa6010d4eb0e8a6b07d8894
SHA51238b39b0735757db56a12db4f3dabe4cbe2e32643618a6076096348f662b8ed89014982f45407cee1f62f53027fb5240180718015861570074f19ea74d51724d5