Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
6c93470ea27ceae5a407ed803c83267f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c93470ea27ceae5a407ed803c83267f.exe
Resource
win10v2004-20231222-en
General
-
Target
6c93470ea27ceae5a407ed803c83267f.exe
-
Size
2.7MB
-
MD5
6c93470ea27ceae5a407ed803c83267f
-
SHA1
33d95a5e6a0298f2defe2bd9c6f38941d53c3ffd
-
SHA256
8537bdae683fb7ce6492e90cde36c71d07e225b7da0be9cfb0e67a00d28b523b
-
SHA512
a3227a555c1f3bf44a84945993ff965857abe22448609bea97c7562a55baea3b61d2de554abddce42f7f00da876a4fe13ebce77a383b49da7e9a21de0757ff01
-
SSDEEP
49152:M2GWDVn768A4JmaTfMO1hvuxZ1gNYnDzjA9ntyLqp475M+eYvRskLd1qapcqM:hF7634Jh4EWb8nsL/75M+eY53d1Ze
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
6c93470ea27ceae5a407ed803c83267f.tmppid process 392 6c93470ea27ceae5a407ed803c83267f.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6c93470ea27ceae5a407ed803c83267f.exedescription pid process target process PID 4404 wrote to memory of 392 4404 6c93470ea27ceae5a407ed803c83267f.exe 6c93470ea27ceae5a407ed803c83267f.tmp PID 4404 wrote to memory of 392 4404 6c93470ea27ceae5a407ed803c83267f.exe 6c93470ea27ceae5a407ed803c83267f.tmp PID 4404 wrote to memory of 392 4404 6c93470ea27ceae5a407ed803c83267f.exe 6c93470ea27ceae5a407ed803c83267f.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c93470ea27ceae5a407ed803c83267f.exe"C:\Users\Admin\AppData\Local\Temp\6c93470ea27ceae5a407ed803c83267f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-CFBPU.tmp\6c93470ea27ceae5a407ed803c83267f.tmp"C:\Users\Admin\AppData\Local\Temp\is-CFBPU.tmp\6c93470ea27ceae5a407ed803c83267f.tmp" /SL5="$F0230,2585432,54272,C:\Users\Admin\AppData\Local\Temp\6c93470ea27ceae5a407ed803c83267f.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-CFBPU.tmp\6c93470ea27ceae5a407ed803c83267f.tmpFilesize
279KB
MD5f3072b4a1b29d275522ac2c6feaf4fe6
SHA111c6b71160f9d7ca73cae33a279c3fa376ff9a8e
SHA256eef54fc2471a1f501e1c71474d4c9a47235a478d83a0d371fd75e547560297ba
SHA51292475ff7bb8fdaa28de9e2959092c74620e2a067e614b4b922c303bcb2be6345c15956942ee0d70690472affaf0f5987a496c1397682e50e7c14258423dddc8d
-
C:\Users\Admin\AppData\Local\Temp\is-CFBPU.tmp\6c93470ea27ceae5a407ed803c83267f.tmpFilesize
310KB
MD591391e44139938caa3cdb23aaf78abcc
SHA129f47a8e67a0752a997a55786ebe90b6218b5aba
SHA25638d695f162aefb0ad4479bbf1d6796ccf60564d4ba04a97c969f958a8f8c1d28
SHA51264c0614d06e292527b83a59b09b7c435e6ec7f7dadb1554a7b5aab20ef11a00920301dc225d0efdd5fa11f648e03c8829aec1297d43368dab9e53fa0a16c0dbb
-
memory/392-7-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/392-14-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/392-17-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/4404-0-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4404-2-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4404-13-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB