Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
750cb749a845c19ce711fa7ab6c70c2f.exe
Resource
win7-20231215-en
General
-
Target
750cb749a845c19ce711fa7ab6c70c2f.exe
-
Size
1.9MB
-
MD5
750cb749a845c19ce711fa7ab6c70c2f
-
SHA1
e63f680a45b43f6e04dd205ae55c4d35637bc1c1
-
SHA256
bd5cb2e1d599b8cfc30a8afbac70baad31c180d39731283a967dbd51d47f8c2f
-
SHA512
8cc2222af87ac8df3fa2d17afce6c6602709aac8b19d35113375b9f5d1fb3697e77b194a95a175fac07eddba7c6477a671ac402f5283fecc76961cab56447d32
-
SSDEEP
49152:Qoa1taC070d6WRWv1oYVvjGPAqKJjiwDT2:Qoa1taC0lWRQoEbGPAb5a
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
5534.tmppid process 2396 5534.tmp -
Executes dropped EXE 1 IoCs
Processes:
5534.tmppid process 2396 5534.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
750cb749a845c19ce711fa7ab6c70c2f.exedescription pid process target process PID 3668 wrote to memory of 2396 3668 750cb749a845c19ce711fa7ab6c70c2f.exe 5534.tmp PID 3668 wrote to memory of 2396 3668 750cb749a845c19ce711fa7ab6c70c2f.exe 5534.tmp PID 3668 wrote to memory of 2396 3668 750cb749a845c19ce711fa7ab6c70c2f.exe 5534.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\750cb749a845c19ce711fa7ab6c70c2f.exe"C:\Users\Admin\AppData\Local\Temp\750cb749a845c19ce711fa7ab6c70c2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\5534.tmp"C:\Users\Admin\AppData\Local\Temp\5534.tmp" --splashC:\Users\Admin\AppData\Local\Temp\750cb749a845c19ce711fa7ab6c70c2f.exe E71F6C50C8E1DD18EC13A0C100533FA1B1D18BC8AA2CD00EFD0AB01DE5B2BA37079FB15F94C2B4E851854FC474AB3996DDA0B73A4480870FD0BD8ABE4303B9422⤵
- Deletes itself
- Executes dropped EXE
PID:2396
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5534.tmpFilesize
192KB
MD517cfbfff2c891bdc3088042ad440f1d4
SHA185ca72e88ccac8a609afbde9178f025e92428da4
SHA25699279e1fde59b255ee6e4633a6d1b98ee2e447e319edc77f62874110f041645c
SHA512d9676d032f8d697930f1c512ffde3bfb4427022a8eec11e04c9b24b30eeda059158a5d566e7c116e0e670fc113983afde6da525f0b19f1e1c1e73b5fef4b332a
-
C:\Users\Admin\AppData\Local\Temp\5534.tmpFilesize
47KB
MD5c916a0ce3fe39e5926625281ce423f00
SHA142339d491c7779f2baee888f2b0a48a84a4955a0
SHA256212c8823093c34c9f385035b300f2405e6df13e5308633ed167f19bc8e368e4d
SHA51224f04a6d9f0ab8000c1b471f59ce1434857bdc2ca524d39c2c87ce8128848d9bd678e6e3650477d6dc9f2f08b39db92e8df33de4e185b0e8844fa4f38070d153
-
memory/2396-5-0x0000000000400000-0x00000000005E6000-memory.dmpFilesize
1.9MB
-
memory/3668-0-0x0000000000400000-0x00000000005E6000-memory.dmpFilesize
1.9MB