Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 17:19

General

  • Target

    ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe

  • Size

    94KB

  • MD5

    ac6dcd80ccb8e7d6d2dd70f59b66a5c5

  • SHA1

    f0881a55cab8efbd96c4b705bcff1153aa314385

  • SHA256

    75ef96eea7336cc5282edf804fda8d23fb7ba77d23cab9dd66fa0bdbb4cf7a49

  • SHA512

    26eea117933696cb67dc459ac52523943f489f6afe6c145366b96dd6b7285dfa1a6008318b69a1947af81d5e717711ccbb75823cf26c3451aa9ac0c77ac0adfc

  • SSDEEP

    1536:aUKgvmnXj8TXda3Is+44umPpZ3V0biEG0J3Xx3brcaTn/EmP3yc+k5:aJwX+b4xfV0GE1VtnczEFD

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe
    "C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Users\Admin\AppData\Local\Temp\msDB33AF4A.nls
      "C:\Users\Admin\AppData\Local\Temp\msDB33AF4A.nls" "C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\msDB33AF4A.nls

    Filesize

    2KB

    MD5

    86fe5b9e7f22247285d366ed8acc383a

    SHA1

    34ec56c9b0e28500bfaf5efd3b3034e202f9954e

    SHA256

    0f8cf1c2173d1fa824073399313bf31e7e08f850f671bf781474e99eee1089a5

    SHA512

    a066d299ed3589ad069523b893b513f83c1b2834ad206386e43fa6c4c432a4560c560d1dbcf8c9c49c94982536e0260c9183a0c3b6bee200798023f3b97ae082

  • memory/4348-0-0x0000000002150000-0x0000000002178000-memory.dmp

    Filesize

    160KB

  • memory/4348-1-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4348-6-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4348-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB