Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe
Resource
win10v2004-20231215-en
General
-
Target
097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe
-
Size
13.9MB
-
MD5
2c75c3f532118216287abab3b1a0c529
-
SHA1
f1a4eb7ec1238d6f5db44a755d25ede133ec8923
-
SHA256
097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6
-
SHA512
78576ed1661ac6c50c7d72bb7324148df659c6e52ab409fd6ef810a5b8565840731d4bfc61b7e044715c6aa873410cfa205278a1c26ef4fcbc316860ed530acd
-
SSDEEP
393216:ett7Oofj7L8sVTHzZMQuN1AvIXN/M6u7K14jbxQA:ett7bLn0NGO/3u7KG3+A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2224 1532 097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe 88 PID 1532 wrote to memory of 2224 1532 097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe 88 PID 1532 wrote to memory of 2224 1532 097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe"C:\Users\Admin\AppData\Local\Temp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\is-QCIIL.tmp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.tmp"C:\Users\Admin\AppData\Local\Temp\is-QCIIL.tmp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.tmp" /SL5="$401D8,13613153,1002496,C:\Users\Admin\AppData\Local\Temp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.exe"2⤵
- Executes dropped EXE
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-QCIIL.tmp\097dd8634f81fb77202fde335c1e69a5f2c1467d25cf0d8a0e753fa1117d90c6.tmp
Filesize3.2MB
MD5c1af7d9a7996c686e1a17eef3c13201a
SHA1a5d9c0064ccdb85cc241e61c042bd7afb7aaa4f9
SHA256da7286b370104c29a8684783cf53bf108105e8446396c2c44d84c283cc43e496
SHA512e88267890c7d1f5d17ab7f4b800c1d6bc16dffe71033841341cd721bf542c6963a02259c6bc9c680b117275eafa7cf4ecd40b319a3f4c335f3d7958bee87576e