Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
78668bea25a84008732085fc0130f1eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78668bea25a84008732085fc0130f1eb.exe
Resource
win10v2004-20231215-en
General
-
Target
78668bea25a84008732085fc0130f1eb.exe
-
Size
3.3MB
-
MD5
78668bea25a84008732085fc0130f1eb
-
SHA1
46ee0fce707519fd831c1898ea1bd97433e76e9e
-
SHA256
8daf492e4acbd40e40c6033c4dd68e70283cceacc489cf0e472917721314389b
-
SHA512
29bc109dc76b2188759d7236328bb2bab955c34b02ea31b8c85b55ad10320cae37a3bfef44a93c276cae4c9edd348a825baecf02920921460ea4e282327163d1
-
SSDEEP
98304:Z7nc5OlkopOHJ9H0Juk+jpUwrnOdTr92hJfp:Jnc5OOWOH08zZrnO552vfp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1824 78668bea25a84008732085fc0130f1eb.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1824 1612 78668bea25a84008732085fc0130f1eb.exe 89 PID 1612 wrote to memory of 1824 1612 78668bea25a84008732085fc0130f1eb.exe 89 PID 1612 wrote to memory of 1824 1612 78668bea25a84008732085fc0130f1eb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\78668bea25a84008732085fc0130f1eb.exe"C:\Users\Admin\AppData\Local\Temp\78668bea25a84008732085fc0130f1eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\is-RMNOO.tmp\78668bea25a84008732085fc0130f1eb.tmp"C:\Users\Admin\AppData\Local\Temp\is-RMNOO.tmp\78668bea25a84008732085fc0130f1eb.tmp" /SL5="$800DC,3241993,58368,C:\Users\Admin\AppData\Local\Temp\78668bea25a84008732085fc0130f1eb.exe"2⤵
- Executes dropped EXE
PID:1824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419