Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
8b1eb836eafa76a6ace9a67b265424e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b1eb836eafa76a6ace9a67b265424e2.exe
Resource
win10v2004-20231222-en
General
-
Target
8b1eb836eafa76a6ace9a67b265424e2.exe
-
Size
1.9MB
-
MD5
8b1eb836eafa76a6ace9a67b265424e2
-
SHA1
63c739f43fee83a9b90d0d3cb40031ffcbc34103
-
SHA256
fbe03f5d280dba249a68ae54ebdb8bb44015d976d9f5569191d06066cdcf58ec
-
SHA512
7d59ebc60d016915d2b82827504a9a1771210f18419744d36f1e2838af1033ba384a7a9c910cfc9dfb9af51e119bddb68582db59fc9c856a2a92b75e15cb6fb5
-
SSDEEP
49152:Qoa1taC070d/uuhvE/L6fP9+SV80KoQ2Q9sL:Qoa1taC0gNhs6fP9+wblQPsL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 896 5052.tmp -
Executes dropped EXE 1 IoCs
pid Process 896 5052.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3172 wrote to memory of 896 3172 8b1eb836eafa76a6ace9a67b265424e2.exe 87 PID 3172 wrote to memory of 896 3172 8b1eb836eafa76a6ace9a67b265424e2.exe 87 PID 3172 wrote to memory of 896 3172 8b1eb836eafa76a6ace9a67b265424e2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1eb836eafa76a6ace9a67b265424e2.exe"C:\Users\Admin\AppData\Local\Temp\8b1eb836eafa76a6ace9a67b265424e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8b1eb836eafa76a6ace9a67b265424e2.exe 354A9F9A84AA53884C44E458EEA4079A4B96707A18F3A0D70748EFC275600A854E58C5A9FA8F6FD58A5B335CC7FAF4F74D3B65304D73DD8F8A73201844C2DE702⤵
- Deletes itself
- Executes dropped EXE
PID:896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD548dfeed112b0b37e7365c3b1c6da043d
SHA15b05bbf10d7bb2f6b03a1a876f360e2f6468005d
SHA2564183b5181f67459758bd93ab9afc9c49df46e4b3e6921a83655fb208cbbbad63
SHA512ac04d1410ee39d28a0015ddca787cb4ef5b658ed1d78ca51011717362636d6da82e45c57f3aefe9935b4c2bfde4f3be6715cac714c7542b8aceb68535c2c9f57