Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe
Resource
win10v2004-20240226-en
General
-
Target
75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe
-
Size
79KB
-
MD5
b9427ba7fcddce68cbd231c810982011
-
SHA1
35efe9d51e3e3be4b1ec5f97f66d77151b7d296f
-
SHA256
75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe
-
SHA512
648af887ff9ce52e82cf70dee789d3ccda87127fda2e8e9cf05cedd3a5778ba0543fa80fc591b6f1fd61e9aa3c8e5bf7f984cafdc31f5adabc9b083de629b88a
-
SSDEEP
1536:zvgM2E1o/OQA8AkqUhMb2nuy5wgIP0CSJ+5yuB8GMGlZ5G:zvgMa2GdqU7uy5w9WMyuN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 840 wrote to memory of 4500 840 75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe 89 PID 840 wrote to memory of 4500 840 75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe 89 PID 840 wrote to memory of 4500 840 75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe 89 PID 4500 wrote to memory of 1776 4500 cmd.exe 90 PID 4500 wrote to memory of 1776 4500 cmd.exe 90 PID 4500 wrote to memory of 1776 4500 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe"C:\Users\Admin\AppData\Local\Temp\75e8b0f12e38203aabada45410dd353b6efa16f4924f1ab70c8704248b1b98fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exePID:4500
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1776
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5b39f48fa5f6fcdd04b181c7edfef89a5
SHA118986973a0dac1aaac272f7c36442e200a7e41c6
SHA256529e4f114a60372e8f665bc404e5f230d289a13e1acf3a4161b2c6e21848ecea
SHA512ad2390dcef701fb40bfe8751576362a4c1a146c5cbec712fbea79332dc411be92ea366bc1507778035749698851f7fc061d86999a114c7366fc49e74458c2378