Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
ad37f8d66b1a10016d3de3e6c2cd2a9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad37f8d66b1a10016d3de3e6c2cd2a9c.exe
Resource
win10v2004-20240226-en
General
-
Target
ad37f8d66b1a10016d3de3e6c2cd2a9c.exe
-
Size
1.9MB
-
MD5
ad37f8d66b1a10016d3de3e6c2cd2a9c
-
SHA1
7f9b46d4221d74dde6db9e4ec06bf19e26f2e0f5
-
SHA256
88f11245b33e61a1dc87628701d35999850773dc81ee03b8be6bef1f87d79a37
-
SHA512
2c193930f30a22a52a09ba738a7f7671feb85e1bbaa6d09c238092c67646a6e58b68b42b2da88061600296158e473b6e7b64db02f746d4a44f4ace5e32833221
-
SSDEEP
49152:Qoa1taC070dp+o9tR/zu62/QrGR4xOEnT:Qoa1taC0wLdQSGmI2T
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3740 6B3D.tmp -
Executes dropped EXE 1 IoCs
pid Process 3740 6B3D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3740 2252 ad37f8d66b1a10016d3de3e6c2cd2a9c.exe 90 PID 2252 wrote to memory of 3740 2252 ad37f8d66b1a10016d3de3e6c2cd2a9c.exe 90 PID 2252 wrote to memory of 3740 2252 ad37f8d66b1a10016d3de3e6c2cd2a9c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad37f8d66b1a10016d3de3e6c2cd2a9c.exe"C:\Users\Admin\AppData\Local\Temp\ad37f8d66b1a10016d3de3e6c2cd2a9c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\6B3D.tmp"C:\Users\Admin\AppData\Local\Temp\6B3D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ad37f8d66b1a10016d3de3e6c2cd2a9c.exe 92E1F2E893CC8AD6982F17BC1374A9B76B9B17A757CBDF12E560423B3009D9AB08719208EBF01867CDE81AE9A4960D0CEA16D8A5ECB3B42837EB1D5114A8404F2⤵
- Deletes itself
- Executes dropped EXE
PID:3740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5db34e7fac627601b9888c0513028a196
SHA1ab82b2b09daa6883ffbda331d7be37392a2085c6
SHA256d5de243398e5b4b42d907013bb162de306c9492f0e1806f9f9417c63836c945e
SHA512b83fa17c863169dc211a968ebf18304b36091b007e2c1ad7f7407dedc93c481c8c56f4e5c6c43b5653c359c2aba66c032f8e625e9bbb80f094f884423de8bff1