Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
9e1d9449d92d69c51a605225410f46f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9e1d9449d92d69c51a605225410f46f9.exe
Resource
win10v2004-20231222-en
General
-
Target
9e1d9449d92d69c51a605225410f46f9.exe
-
Size
1.4MB
-
MD5
9e1d9449d92d69c51a605225410f46f9
-
SHA1
f6e4d110f48bb4264097dd3101ef791f2c3d01b0
-
SHA256
c5e71ca1dcfe7975449a25d339036f3720b0b72aa52d8794b024442216487a4d
-
SHA512
000904eeacc9cc086a9f666dc8cca356e4d1a0ec0fc79dd9032c1b37399a8d75585d4a9b874ca161a38675afe69fceb817482afba75f0e09fc11169fdf16227c
-
SSDEEP
24576:N8tYzPKod2UyOtEIh85b6vBIFPocvBlcjPPdoCmNIqS2IR0QQPyMzMZB84D:N8tOPKjp017vBIRvBluPdoCmNM2y08CU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.exedescription pid process target process PID 1456 set thread context of 2360 1456 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exepid process 1456 9e1d9449d92d69c51a605225410f46f9.exe 1456 9e1d9449d92d69c51a605225410f46f9.exe 2360 cmd.exe 2360 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exepid process 1456 9e1d9449d92d69c51a605225410f46f9.exe 2360 cmd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exedescription pid process target process PID 1456 wrote to memory of 2360 1456 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 1456 wrote to memory of 2360 1456 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 1456 wrote to memory of 2360 1456 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 1456 wrote to memory of 2360 1456 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2360 wrote to memory of 4848 2360 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2360 wrote to memory of 4848 2360 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2360 wrote to memory of 4848 2360 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe"C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exeC:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe3⤵PID:4848
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1004KB
MD5c786946b08eb0730a7bcd6a89ab3717f
SHA14dc9343bfa3f56532e0c83f9a9d2eec45dc6aca8
SHA256dd67361dce6acb2b35ca829fcf0c78a5266743474ec46f1d103894c328a28fcf
SHA51204589b6c15cf0c794d2a75df77c8fde27d2e45fa42be54a300a92b410fb694ab3080d31551496e99fe30c43116e4d1d86d141f5bdc9bbab85c707b96c4abdd0d