Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe
Resource
win10v2004-20240226-en
General
-
Target
c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe
-
Size
816KB
-
MD5
642a2b3a9fb831673562afeeb69cbb78
-
SHA1
f8e3fb1be4328577f873edbc5ff2796a039e2841
-
SHA256
c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce
-
SHA512
3a6b84113f2a09eee95e560d2c60a4b2cdae69a9196923694e053d125ce385fb5259c01d448430d68baf0f19a5dff14272e0a65faa2a29e62ff0e37b20176619
-
SSDEEP
24576:VY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9U:K3XZynV4oDabuWbDQOcIxJJ9U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1944 1C0B0D0A120D156C155F15B0E0E160C0B160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 700 c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe 1944 1C0B0D0A120D156C155F15B0E0E160C0B160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 700 wrote to memory of 1944 700 c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe 89 PID 700 wrote to memory of 1944 700 c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe 89 PID 700 wrote to memory of 1944 700 c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe"C:\Users\Admin\AppData\Local\Temp\c7cddb6595515a106cfbec1a14c9dbe4d636e81c4b8ebd811c238484c7282fce.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\1C0B0D0A120D156C155F15B0E0E160C0B160D.exeC:\Users\Admin\AppData\Local\Temp\1C0B0D0A120D156C155F15B0E0E160C0B160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5989308722e990abbaf5985e36bcc779b
SHA1fe7002bb7f9269a76e51bdc8038d983bb623880c
SHA25678b52c474d13163462d0918076cc0fbea5907106778e2214bb0a6374ef94dd2e
SHA5125fd1e68dc9580c318f97173a6378e8c4ad46ee744634788232b18e118aa2c8fc12888003bfdbc8939b40ecbf926879c21aded0e30b20afcb5b2568fa3ac246ba