Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
8b28d201e9809bfe00ce88ccc60a8836.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b28d201e9809bfe00ce88ccc60a8836.exe
Resource
win10v2004-20231222-en
General
-
Target
8b28d201e9809bfe00ce88ccc60a8836.exe
-
Size
40KB
-
MD5
8b28d201e9809bfe00ce88ccc60a8836
-
SHA1
5bb6267b6b9ec7190bb3ef4afd8ff87c0582455f
-
SHA256
4ef4c0625277dcd58c2da75051394194a19bbba95f11ffa29cc85edf806f2783
-
SHA512
8186cea74e9558a96ce6ae5e31e367c4f41e69185e99dbe9126943fccd2e332fdf21252be1214e1b1cd2b1f6cc20f3ac54bc22667d68ea258e0c5f3feb93fef9
-
SSDEEP
768:F2Fbh3hQxpf38xAb+miZKioox80H1JNYIJZXkkFtrq3qvfcArCYf9:wFXupbv7AvH1IIXFte3qvkArf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4664 abcd.exe -
Executes dropped EXE 2 IoCs
pid Process 4664 abcd.exe 4940 abcd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\abcd.exe 8b28d201e9809bfe00ce88ccc60a8836.exe File created C:\Windows\abcd.exe 8b28d201e9809bfe00ce88ccc60a8836.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe 4940 abcd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 4664 1340 8b28d201e9809bfe00ce88ccc60a8836.exe 22 PID 1340 wrote to memory of 4664 1340 8b28d201e9809bfe00ce88ccc60a8836.exe 22 PID 1340 wrote to memory of 4664 1340 8b28d201e9809bfe00ce88ccc60a8836.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b28d201e9809bfe00ce88ccc60a8836.exe"C:\Users\Admin\AppData\Local\Temp\8b28d201e9809bfe00ce88ccc60a8836.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\abcd.exeC:\Windows\abcd.exe -s "C:\Users\Admin\AppData\Local\Temp\8b28d201e9809bfe00ce88ccc60a8836.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:4664
-
-
C:\Windows\abcd.exe"C:\Windows\abcd.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD58b28d201e9809bfe00ce88ccc60a8836
SHA15bb6267b6b9ec7190bb3ef4afd8ff87c0582455f
SHA2564ef4c0625277dcd58c2da75051394194a19bbba95f11ffa29cc85edf806f2783
SHA5128186cea74e9558a96ce6ae5e31e367c4f41e69185e99dbe9126943fccd2e332fdf21252be1214e1b1cd2b1f6cc20f3ac54bc22667d68ea258e0c5f3feb93fef9