Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
b6d3c9eda404f30cdbdd8838a9a18060.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b6d3c9eda404f30cdbdd8838a9a18060.exe
Resource
win10v2004-20240226-en
General
-
Target
b6d3c9eda404f30cdbdd8838a9a18060.exe
-
Size
7KB
-
MD5
b6d3c9eda404f30cdbdd8838a9a18060
-
SHA1
47582da13c97902844df63305f198ad2be929d2c
-
SHA256
51885a3299e9fc3dbc6cb70dc3b5099a72523c34ffc4284b0d658714ef752f6c
-
SHA512
26518ae7c41e2709f1ad6131505b3f544fec283e376e1edf3f69754ef06d719a1fda67ee6c4053285f46afee4941c0e4d110b0ce7fcc86562ff806e105f1c078
-
SSDEEP
192:LUbT6ffMF8uC3HhxPDE524w9pTr0QIPE/6xevoJJvv4JU7W:gbTp6q5ITr68/CppvIU7W
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 1472 3184 b6d3c9eda404f30cdbdd8838a9a18060.exe 88 PID 3184 wrote to memory of 1472 3184 b6d3c9eda404f30cdbdd8838a9a18060.exe 88 PID 3184 wrote to memory of 1472 3184 b6d3c9eda404f30cdbdd8838a9a18060.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d3c9eda404f30cdbdd8838a9a18060.exe"C:\Users\Admin\AppData\Local\Temp\b6d3c9eda404f30cdbdd8838a9a18060.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c echo @echo off>"rm.bat"&echo :try>>"rm.bat"&echo @del /F /Q "C:\Users\Admin\AppData\Local\Temp\b6d3c9eda404f30cdbdd8838a9a18060.exe">>"rm.bat"&echo if exist "C:\Users\Admin\AppData\Local\Temp\b6d3c9eda404f30cdbdd8838a9a18060.exe" goto try>>"rm.bat"&"rm.bat"&@del /F /Q "rm.bat"2⤵PID:1472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194B
MD5da36fdbba5c2cea3bc2542d20651c09d
SHA103fddbcbd291e37265b7d74116984f354d270c11
SHA256d9b021d55c19fd59d89ae3894fb534eac005bfd7ea1830e5d368c705b6b55ae6
SHA512a3072f8be1940e74046e1895aeaa1fa095d80326ed384c0b0541b4dc6bf1fc594046161076c175744765c22453cb4c59fe13f9aded26d47c6d774781213a297f