Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
5a0158574ddf408e8adc686466db6790.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a0158574ddf408e8adc686466db6790.exe
Resource
win10v2004-20231222-en
General
-
Target
5a0158574ddf408e8adc686466db6790.exe
-
Size
910KB
-
MD5
5a0158574ddf408e8adc686466db6790
-
SHA1
f4dc209d1c35b11c1d92645f631a2cd5376d7d93
-
SHA256
94396988625f888ae1b70daae2085d0720de931f2a5613bba920de21769a5027
-
SHA512
c7ee8143f501ec94928051ff54730efdd1cab3a582bf9a643cdf417bc3ca566904831a51136f88eb3561c4e4db38edc333e0aad97225c83fc635e941a7435b7b
-
SSDEEP
24576:fQJfqPKjHBmUmOSS3LGxBvnYLOvvItxL1:fAvQESSbqRivxB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4752 iiexplorer.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat 5a0158574ddf408e8adc686466db6790.exe File created C:\Windows\SysWOW64\iiexplorer.exe 5a0158574ddf408e8adc686466db6790.exe File opened for modification C:\Windows\SysWOW64\iiexplorer.exe 5a0158574ddf408e8adc686466db6790.exe File opened for modification C:\Windows\SysWOW64\iiexplorer.exe iiexplorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4752 1428 5a0158574ddf408e8adc686466db6790.exe 91 PID 1428 wrote to memory of 4752 1428 5a0158574ddf408e8adc686466db6790.exe 91 PID 1428 wrote to memory of 4752 1428 5a0158574ddf408e8adc686466db6790.exe 91 PID 1428 wrote to memory of 5624 1428 5a0158574ddf408e8adc686466db6790.exe 92 PID 1428 wrote to memory of 5624 1428 5a0158574ddf408e8adc686466db6790.exe 92 PID 1428 wrote to memory of 5624 1428 5a0158574ddf408e8adc686466db6790.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a0158574ddf408e8adc686466db6790.exe"C:\Users\Admin\AppData\Local\Temp\5a0158574ddf408e8adc686466db6790.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\iiexplorer.exeC:\Windows\system32\iiexplorer.exe -NetSata2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:5624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD50eed0f73cbaf9bd57cc66148e4fb0a9a
SHA13d22299560bb37172f73c8477278ec1cb8994a91
SHA2569f4ce3c9e8904605565fe502e5cecbc0dea018ec1610a43a90aef5a29a85d11d
SHA512c5c401a66da3239c43a5971be9dce0e4af2ad8794cc6e2d6120e17b3d5465fe3ec579cb5be2d3df6352f0fad299fb84eae70a54b1906c8e8e3538d9735a29ad5
-
Filesize
910KB
MD55a0158574ddf408e8adc686466db6790
SHA1f4dc209d1c35b11c1d92645f631a2cd5376d7d93
SHA25694396988625f888ae1b70daae2085d0720de931f2a5613bba920de21769a5027
SHA512c7ee8143f501ec94928051ff54730efdd1cab3a582bf9a643cdf417bc3ca566904831a51136f88eb3561c4e4db38edc333e0aad97225c83fc635e941a7435b7b