Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
752dfafe0c224a2634c4f81eea4341a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
752dfafe0c224a2634c4f81eea4341a5.exe
Resource
win10v2004-20231215-en
General
-
Target
752dfafe0c224a2634c4f81eea4341a5.exe
-
Size
526KB
-
MD5
752dfafe0c224a2634c4f81eea4341a5
-
SHA1
bd1764bd0ec41701548090891c0d891ebfac138e
-
SHA256
eb1125a564772e5d4442fa8d83d344dc46ef5bfa8fe7f641adf4f5aec285a049
-
SHA512
94cdc521a4e0283ddf27e280e0780059f5fcc6adb643da61d6173dfa0ce158095456fd865868b3be147d4855056710d54c479d8eb5faa6bd3eaeb0def84031d6
-
SSDEEP
12288:oHwhDZMuXqgo6fEeFmAzvPFU0wgnY4kAF9Pe4d:og9Dn8bgtTk4zFte4d
Malware Config
Signatures
-
Loads dropped DLL 52 IoCs
pid Process 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe 2888 752dfafe0c224a2634c4f81eea4341a5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2888 set thread context of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2888 wrote to memory of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87 PID 2888 wrote to memory of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87 PID 2888 wrote to memory of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87 PID 2888 wrote to memory of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87 PID 2888 wrote to memory of 4724 2888 752dfafe0c224a2634c4f81eea4341a5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\752dfafe0c224a2634c4f81eea4341a5.exe"C:\Users\Admin\AppData\Local\Temp\752dfafe0c224a2634c4f81eea4341a5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\752dfafe0c224a2634c4f81eea4341a5.exeC:\Users\Admin\AppData\Local\Temp\752dfafe0c224a2634c4f81eea4341a5.exe2⤵PID:4724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5536995ca3f9da1bc6aaa900948e0314f
SHA1cdd6b8b8cece3b905b9d18242724136c6ab2013c
SHA25624b3c94761a8b726fc91944fd25f64406b39dd4d9414ef333899321471cdf922
SHA512d502b7f83ad48ec49bd94699545ebca636c374f6d89b2d1f230bfff0ead0153e61c5347febebd22ff1fc2918555b90a0212291eb9cb668b9132fc774243658a9
-
Filesize
76KB
MD5e2ed22dc9aa028788bd7739eabf11a45
SHA1a0c50e0b40f7e6dad07d076309b0833c0d5c467c
SHA256711e3f81f848e7960ac52cf55683422dd7400f3f879e451445d29af656f41349
SHA51275d5a3c3df48745513ca56b58e87a5cebe061cd22364d10be9c42ecb96f1391df694816e6f72f72d44f2b0ed7ace725362af039d39ced859bc19860da0244e3f
-
Filesize
76KB
MD591c0047d4d099d7c02049d92be5c2947
SHA1dedb1ab7e3d765811b79154e4e9ad1370de60675
SHA2560bf85a42e4d249152efa5da883ea0245b9b699c142a8bd19d31584c35591b080
SHA5124041e240fcc3998c9fe3ecfbe198f8f5642561c9875304c273eca08b308c9239b5119e35e314825d8d6b593d2415e7c4ca7fc00fcb7220b22dab0a1191dcf16a