Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
8a05e19241d7e5d275497b25596f3962.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a05e19241d7e5d275497b25596f3962.exe
Resource
win10v2004-20231222-en
General
-
Target
8a05e19241d7e5d275497b25596f3962.exe
-
Size
9.3MB
-
MD5
8a05e19241d7e5d275497b25596f3962
-
SHA1
08ea75301ee078940a2e43f0a9e124dd0485c9a5
-
SHA256
a8c4f47f7a96d085c5badb6c04b498e8ea59faa8f89529bd545291856ddd9f33
-
SHA512
9be424b795fd4128b9ae826fab04a1a23c311eed1b39e7cff6cc7f031f3d3dcfe767761449ac6ee01b27e6f7bb85f089637743cda91527533bc8fa08d4a9526f
-
SSDEEP
196608:Y5QISFTFECL24qaj6tX/tRvc9rdybE+1JLzOoLxhETR1GFYXiaPhwWXs:YehTjVj61z0CbE0xmTXKYXhT8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4896 is-0JH3P.tmp -
Loads dropped DLL 2 IoCs
pid Process 4896 is-0JH3P.tmp 4896 is-0JH3P.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4896 2180 8a05e19241d7e5d275497b25596f3962.exe 86 PID 2180 wrote to memory of 4896 2180 8a05e19241d7e5d275497b25596f3962.exe 86 PID 2180 wrote to memory of 4896 2180 8a05e19241d7e5d275497b25596f3962.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe"C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\is-IIJL1.tmp\is-0JH3P.tmp"C:\Users\Admin\AppData\Local\Temp\is-IIJL1.tmp\is-0JH3P.tmp" /SL4 $A0068 "C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe" 9458817 522242⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
643KB
MD5036ef63e2f9b138a42d6adb54ec0cd1e
SHA1353db5d438205a726a6d54beb62f9c62638f501d
SHA25671b487f0523f213004766402b22bf86fa0ef9891e940d2a4cb12eba6627e7cc6
SHA51231b8f6e76c8c4f5323f12384c41f6f2b04e58545c121da71e2a4da947a9c0aea9eb05df4f8199cc6dc89bc238577c4e2d5fb4b66e77e1130bc72b6c38f207cc9
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6