Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
a1e2834518d7dff40aff4f17c36d74f9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1e2834518d7dff40aff4f17c36d74f9.exe
Resource
win10v2004-20240221-en
General
-
Target
a1e2834518d7dff40aff4f17c36d74f9.exe
-
Size
94KB
-
MD5
a1e2834518d7dff40aff4f17c36d74f9
-
SHA1
f805c9da836a9f779e56845592a9ccb6f75d3308
-
SHA256
cf107727905481beba3df46e29439ad01623ad008bebbf665c1a5ccd6d9b6c06
-
SHA512
20370b883ce115633ebab914e536ba90ea3d4f213e06cb2d94aa7a3ec903c91e4e1a9dc910e55c51280cf355de45ba0ebd4ce97f23efc7f1539b330128ba22bf
-
SSDEEP
1536:WMq5CUQrCovkU99w6UC8f3NbuRhdHxFymPHqV1rUM2fR08aU+Mj9:kCUGhv26d8/NinNxFymCV1rUM2p0xU+y
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyArp.exe = "C:\\Windows\\system32\\MyArp.exe" a1e2834518d7dff40aff4f17c36d74f9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MyArp.exe a1e2834518d7dff40aff4f17c36d74f9.exe File opened for modification C:\Windows\SysWOW64\MyArp.exe a1e2834518d7dff40aff4f17c36d74f9.exe File created C:\Windows\SysWOW64\Deleteme.bat a1e2834518d7dff40aff4f17c36d74f9.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4924 wrote to memory of 5208 4924 a1e2834518d7dff40aff4f17c36d74f9.exe 88 PID 4924 wrote to memory of 5208 4924 a1e2834518d7dff40aff4f17c36d74f9.exe 88 PID 4924 wrote to memory of 3380 4924 a1e2834518d7dff40aff4f17c36d74f9.exe 89 PID 4924 wrote to memory of 3380 4924 a1e2834518d7dff40aff4f17c36d74f9.exe 89 PID 4924 wrote to memory of 3380 4924 a1e2834518d7dff40aff4f17c36d74f9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e2834518d7dff40aff4f17c36d74f9.exe"C:\Users\Admin\AppData\Local\Temp\a1e2834518d7dff40aff4f17c36d74f9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Internet Explorer\iexplore.exePID:5208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD599952fe2a7921e1baa36bc1697a8e6c0
SHA15607dd1a10a771810c5e86fb73e9c26b61a0370e
SHA256ea581861c3f9083a3d40c8174b8a46c45d1cfbd49cfaeb6e314bbeed6e0d63ac
SHA5120127ffc14cf4f87ce3452234362f5f707222cc164cc0d6589c2c835a13a9dd14f08d0b7cbaceb13bd17c8b7f511a0c549da447f7c250bb5af0bdf6b623cf4145