Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
6fddfc798857a4a568c2793ddf86f69e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fddfc798857a4a568c2793ddf86f69e.exe
Resource
win10v2004-20231222-en
General
-
Target
6fddfc798857a4a568c2793ddf86f69e.exe
-
Size
15.6MB
-
MD5
6fddfc798857a4a568c2793ddf86f69e
-
SHA1
959e078af5f26a891fed16d33aca4531cb1761a6
-
SHA256
c9fb7748b12c692347e65ec3a8c77315788226a6a8d1cab9bc958468e821b959
-
SHA512
85b8ceb339b415d9c081a00bcf2bd1d421c9cc95922ca14e5317cf62760503148419d74d8af8b9586ee8ae1e2a85e498de64da3d0358e9af9e36d146be780aeb
-
SSDEEP
393216:dNPqL1Utojn4vM2XNeDt85ZxJbCFSQVKKvYh+gWVNxyZ:dE4eUZxJbCFSiYVWTxyZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 6fddfc798857a4a568c2793ddf86f69e.tmp -
Loads dropped DLL 1 IoCs
pid Process 2284 6fddfc798857a4a568c2793ddf86f69e.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2284 1564 6fddfc798857a4a568c2793ddf86f69e.exe 70 PID 1564 wrote to memory of 2284 1564 6fddfc798857a4a568c2793ddf86f69e.exe 70 PID 1564 wrote to memory of 2284 1564 6fddfc798857a4a568c2793ddf86f69e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fddfc798857a4a568c2793ddf86f69e.exe"C:\Users\Admin\AppData\Local\Temp\6fddfc798857a4a568c2793ddf86f69e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\is-EUGIJ.tmp\6fddfc798857a4a568c2793ddf86f69e.tmp"C:\Users\Admin\AppData\Local\Temp\is-EUGIJ.tmp\6fddfc798857a4a568c2793ddf86f69e.tmp" /SL5="$A003C,15976984,142336,C:\Users\Admin\AppData\Local\Temp\6fddfc798857a4a568c2793ddf86f69e.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5effdc5477f85810360339c4e4d3e4f50
SHA1b138256d30b8a6374494a8c53f60befa6a6504fd
SHA25622d3b5cdaf4f1369b035d1296d16cc262775bc1c54c7d266c2f1abff9a0c5959
SHA5123d17c66855727d8de4a24119f8c6a1b616bea0d120795aa8cd1c8ca039dadc28ac96fbde2e222c64d24bd3c11f4ef051bd8a7f0b0989fbb470fd0e77fcc1107b
-
Filesize
774KB
MD5cb36f0dafcd7ad826e9cf732d9b1b1cd
SHA146a445e9520e21d31a00782b10ff7b89c6663d67
SHA25609e74c65dac1920c30a5b657378cdbb1dfbc55d0250add5b4ad160b6fb6b6dd4
SHA5122ba61d56ca0378e86a0dd145c2044900b791c155c43df1ec7ba0dd89edf5c20460be2886c9937a142a114cb53ece6867cae65efd2fee248b463333950c2ab2a9