Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
8ef702413698c7431154916980814597.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ef702413698c7431154916980814597.exe
Resource
win10v2004-20231222-en
General
-
Target
8ef702413698c7431154916980814597.exe
-
Size
204KB
-
MD5
8ef702413698c7431154916980814597
-
SHA1
487e6617f7ac8c0180f86e99c50b5e3c9dd533bd
-
SHA256
5128803071317562fe8778a0edc1f5ddac7740996f1dc67408db6a8c4d0b2d27
-
SHA512
67441d743e6f9c37d59e098fb7e439e5aa12ef51da5b2dbcd9e9b341fb6dd9fb6e5d54b103ad5b0602d4ce271402631a4e5cf31f38eb01f39e98d417b93255b0
-
SSDEEP
3072:bEHuVcqMIrEM/3ruhHpPKeqv1l/fnv+8UMBZJrX5hFcC:bEHQcqMIb3ihHIeqtl/HHZvhFc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 336 8ef702413698c7431154916980814597.exe 336 8ef702413698c7431154916980814597.exe 2340 WMIC.exe 2340 WMIC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 336 wrote to memory of 2340 336 8ef702413698c7431154916980814597.exe 84 PID 336 wrote to memory of 2340 336 8ef702413698c7431154916980814597.exe 84 PID 336 wrote to memory of 2340 336 8ef702413698c7431154916980814597.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ef702413698c7431154916980814597.exe"C:\Users\Admin\AppData\Local\Temp\8ef702413698c7431154916980814597.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Intel\WMIC.exeC:\Intel\WMIC.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5db4e71106f5a6d95f44c8aa39ed6b667
SHA1ff8fa25fb259365c0e695a406675d8a624620208
SHA2564c1381de74ff1049334882d13c7d1529a5462ab9933e2649631521fb7e21aecc
SHA512d4fdb9dd6651d11ff299aa0d0a673ff21228921a665f5152f28f11f80ebc5d5caab92d5b96cc06972646956d7e4738d9598134d072fc9d42c4038299e1be161a
-
Filesize
3KB
MD5ed716e7d91d72cde335ea1903c72fa57
SHA17584e9bbb97073f26f6087474ccaf2e9bad75671
SHA2565b500c27bbfe2a2d6fb63930e7ea2a77483036b1ec46222f855b445d628f2547
SHA5128a403cc9dcf00ad951602aae9a3cfff37f5cbd4f84baf607177f2bd7321ac58b90b969472fb4b44ee0585db05b0ddd1b6628a2b0990e73c6de2fc3d24e9945cb