Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
8c9ee6efa40c3f561ba7044d829eddb0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c9ee6efa40c3f561ba7044d829eddb0.exe
Resource
win10v2004-20240221-en
General
-
Target
8c9ee6efa40c3f561ba7044d829eddb0.exe
-
Size
433KB
-
MD5
8c9ee6efa40c3f561ba7044d829eddb0
-
SHA1
11d7c7eb9c4cddc35ed640ed356f0989b0809642
-
SHA256
cb1f507c4b4c3a40400b6cd1da10e68500b184d27a8df72c4d7f1a38399bfeb5
-
SHA512
b2a731541015c5e6ed02d85834f81772f22b393b18b8c651a0ec3e0fa6de03b9e56fbb9861e69e3feabe1bce8e1c474014ffd9a07e0c40ef9bb0a7f1ba43af4f
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvfi7t1Uirb9j6Xo/kmlZ/Hr2JgLyZwn:Ci4g+yU+0pAiv+Vi7zrrmyL2qWZwn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5096 5EBA.tmp -
Executes dropped EXE 1 IoCs
pid Process 5096 5EBA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 5096 3856 8c9ee6efa40c3f561ba7044d829eddb0.exe 87 PID 3856 wrote to memory of 5096 3856 8c9ee6efa40c3f561ba7044d829eddb0.exe 87 PID 3856 wrote to memory of 5096 3856 8c9ee6efa40c3f561ba7044d829eddb0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9ee6efa40c3f561ba7044d829eddb0.exe"C:\Users\Admin\AppData\Local\Temp\8c9ee6efa40c3f561ba7044d829eddb0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\5EBA.tmp"C:\Users\Admin\AppData\Local\Temp\5EBA.tmp" --helpC:\Users\Admin\AppData\Local\Temp\8c9ee6efa40c3f561ba7044d829eddb0.exe 3FF02BA26C8B791BA775E91C40CB0F675E94ECBA235D0110175D911623EB0091969FA232885B450B554BC73C45616482B1FD6E3C5F72ADD6BC76DF03E815137E2⤵
- Deletes itself
- Executes dropped EXE
PID:5096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5e8294b589fe74e73c5303a5145b8be69
SHA1c3f9268b677cd65be1a437a57dfe6d2106d207a2
SHA256d67c5b0227df734b183d4de2936e09d802baf30f6672095eccac2ca0cb783160
SHA51273ea0c3f95a3e0220aaf356ef421dd2ce65cc64189b617be42f90dceaab4af939997d679793bc030b79fbe9ba569b44fba83bf921ec5a9265d98e7bc8387369b