Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe
Resource
win10v2004-20240226-en
General
-
Target
e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe
-
Size
384KB
-
MD5
d988bfc1e33c926b216b8db67e8bda01
-
SHA1
2380920bd47237f07b71483ef3b94142df7a7bc9
-
SHA256
e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36
-
SHA512
ef0be9cef70888350c35c58bd40fe2954934dae26c6fd38107f88f82315b717299933a7697f373c5b7671d53d7666b3e81ebe07db92f71abfb6373b49e6b8f19
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHArmByfIqO16sm9ElXs32QwB3w0grikFdFgZ:Zm48gODxbzWZIB16smWlXO2xAtvQZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 6A24.tmp -
Executes dropped EXE 1 IoCs
pid Process 2688 6A24.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 2688 3088 e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe 87 PID 3088 wrote to memory of 2688 3088 e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe 87 PID 3088 wrote to memory of 2688 3088 e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe"C:\Users\Admin\AppData\Local\Temp\e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp" --pingC:\Users\Admin\AppData\Local\Temp\e7b1ba9aff5491b344940f2f7831089b3346fe7b54eb56e52fe3d8adcd4cff36.exe 3675A7DF327E95BE903E5621ED9F2C041C0B7A5A8BA1723BCFEB8A9C8C6693D79225A926D87D1B92645F3FEAB2E2443B0D1BF19BD99BBCA4F602AC545AE5D5C42⤵
- Deletes itself
- Executes dropped EXE
PID:2688
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5bd000a8fd247af8df449eedc4500ebb9
SHA1743273a2fa855b24d66cfe5ed1c4438eaf671fc2
SHA25692b3b1c43cdbdb0725bcfe04941bb1196475b01be912a7e7a754c85aea0ebb85
SHA5128098aa704c44932efd2fef407902fef7432b31b17f1622691da0887fa01aacc3dbd824b50af13d7a9badcfab6a9dc2e76e528a71aa7e33ff782ded63a6b08435