Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
8e8b6e29535871b9b9331912d1772ee2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e8b6e29535871b9b9331912d1772ee2.exe
Resource
win10v2004-20231215-en
General
-
Target
8e8b6e29535871b9b9331912d1772ee2.exe
-
Size
1.9MB
-
MD5
8e8b6e29535871b9b9331912d1772ee2
-
SHA1
f5df1086c6644a54ee3a8e0b73c2d835da931bb4
-
SHA256
e1c68ada25ce27178572debca11efb387bfabb3fd59f3f52bc325f5b969938bd
-
SHA512
a29a2b59227bfcfe96cd5b83db06e2723efb9d29a0ae86917b5b02f862223da3cd8564c40629a691610336780616be09b0273301b279701b2b6d4696114d6ff3
-
SSDEEP
49152:Qoa1taC070dg7QRzxp68RMNgbdyMKg0kH:Qoa1taC0ZonmZgL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1920 AEED.tmp -
Executes dropped EXE 1 IoCs
pid Process 1920 AEED.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4620 wrote to memory of 1920 4620 8e8b6e29535871b9b9331912d1772ee2.exe 84 PID 4620 wrote to memory of 1920 4620 8e8b6e29535871b9b9331912d1772ee2.exe 84 PID 4620 wrote to memory of 1920 4620 8e8b6e29535871b9b9331912d1772ee2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe"C:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\AEED.tmp"C:\Users\Admin\AppData\Local\Temp\AEED.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe F647D34FFB5D85534F0D35B35DF66EE2BC2B4B1F30F41280CB85B044473212C7795EE6C0C977E7CD1F05016092128DF77304B57C8DD963E818B9187A9D9EBD652⤵
- Deletes itself
- Executes dropped EXE
PID:1920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d01e47b31af17552760ee6c497ec3d07
SHA17b59305d94a0dde6eb0d6d86e3c941d3f70c2ac4
SHA2561cfb8a66ca6be40c7b3c89812d11423a81cda3018066244c60b5a603cf28e6ac
SHA5120e0d891286297296f33c796e70b4f11af31d5e52d24c42003892d5665c863d4ee6ef811514ec7f3ef23d90f1e4f1f5076714a3324a7d45411dc1c8b6c3aff81d