Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 17:59

General

  • Target

    c400a40784376288f0c6f1659fe41379.exe

  • Size

    71KB

  • MD5

    c400a40784376288f0c6f1659fe41379

  • SHA1

    06ae6a595e2d0bd405b86166ba4e5ac54338f335

  • SHA256

    e6871367911d0f3c6c2393629c18ffbac6d61d31d5c191a8b0d6c3ebc6f06a6d

  • SHA512

    a575a11d0cffedbadee0f4406c4f5504c46e3fee1f736dc6b60dab5f00a5eb880f41eed95f4bd2550bd23fcf8bacfe70e8b7d043da6a9315b9f2342575a86d69

  • SSDEEP

    1536:kKa6mNMEKrAeI+m5X3WPJ08PANumDuuaVn8:jmuEKrA5+mFoC84Jns8

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\c400a40784376288f0c6f1659fe41379.exe
    "C:\Users\Admin\AppData\Local\Temp\c400a40784376288f0c6f1659fe41379.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c echo @echo off>"sd.bat"&echo :try>>"sd.bat"&echo @del /F /Q "C:\Users\Admin\AppData\Local\Temp\c400a40784376288f0c6f1659fe41379.exe">>"sd.bat"&echo if exist "C:\Users\Admin\AppData\Local\Temp\c400a40784376288f0c6f1659fe41379.exe" goto try>>"sd.bat"&"sd.bat"&@del /F /Q "sd.bat"
      2⤵
        PID:4068

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\sd.bat

            Filesize

            194B

            MD5

            9105aab6143247fee40952da0221aaa9

            SHA1

            d7c8b98ffcc25918a18af491a147139c255e233c

            SHA256

            97d25943e1bf36c889799929ea4f1bbadf35d2a0d3efb334ac0324007ff0dbd7

            SHA512

            17fdc82eae905720809064be16464b277788f52440b3350f225be0d0e3f329dea8e1ed9a30147b00694657e2767369bbad2295796be532393676eb16e44b0bc5

          • memory/2264-0-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/2264-1-0x000000007FE40000-0x000000007FE41000-memory.dmp

            Filesize

            4KB

          • memory/2264-2-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/2264-3-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB