Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
bc3d561ce6d544e13fc9570980b03360.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc3d561ce6d544e13fc9570980b03360.exe
Resource
win10v2004-20240226-en
General
-
Target
bc3d561ce6d544e13fc9570980b03360.exe
-
Size
1.7MB
-
MD5
bc3d561ce6d544e13fc9570980b03360
-
SHA1
68a9711402e07b5347af6f6e2d103a201281356b
-
SHA256
cfc606a0d46c31631bb01699ef0a28f2f58cc2d7badd7a282f39cd1c27620a40
-
SHA512
2993eb5f7cf191ee3f7883980afe019cc085889febb72d426841ccd460a6a2af5b01630d19c3d80cefabd3e79b3b46451036b523a45e736b39ea988455b6480b
-
SSDEEP
24576:t4nXubIQGyxbPV0db26WU7qKnusv1Et9uGpckT52zedlq89Ws5uIzk5aM/phdOH:tqe3f6V5fSffPMWrQ0Zky
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 bc3d561ce6d544e13fc9570980b03360.tmp -
Loads dropped DLL 1 IoCs
pid Process 2036 bc3d561ce6d544e13fc9570980b03360.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 2036 4248 bc3d561ce6d544e13fc9570980b03360.exe 89 PID 4248 wrote to memory of 2036 4248 bc3d561ce6d544e13fc9570980b03360.exe 89 PID 4248 wrote to memory of 2036 4248 bc3d561ce6d544e13fc9570980b03360.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\is-A3BRJ.tmp\bc3d561ce6d544e13fc9570980b03360.tmp"C:\Users\Admin\AppData\Local\Temp\is-A3BRJ.tmp\bc3d561ce6d544e13fc9570980b03360.tmp" /SL5="$50062,921114,831488,C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD538e9177040663abdf7cb42d237b03d9d
SHA10b95b3694406d9d86aa3e4953f42d471977ff03d
SHA2562a322dbda4ac86aed04ab99f9f2c277c2f84b6046e234c3ae55ceec53883b594
SHA51278db4c72b2e10d665775e7f306d926060c95ba47610e809e0a21006280f9f0280fa572168b9c9ee00e2121090db9a20dc524677d961fea4292c41c44ba3cb30f
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57