Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
c6eb7788a682907485bd590e01b6b090.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c6eb7788a682907485bd590e01b6b090.exe
Resource
win10v2004-20240226-en
General
-
Target
c6eb7788a682907485bd590e01b6b090.exe
-
Size
1.9MB
-
MD5
c6eb7788a682907485bd590e01b6b090
-
SHA1
7426ff51d4e070bf9e6faef631c35a562d5b95d9
-
SHA256
0b51ed20bf5c4f24cf9843628e723ad46eb707e5bc2dbd17c07c99ab4fc852b9
-
SHA512
43d003181500f98e699d901ce2198a803a357c69f6ac23ce7edb60247dd76382e37504e4ef96deeb9f047e15efead1789293c08c9b6ee382bcd1b526da43f4b2
-
SSDEEP
49152:Qoa1taC070dnQYCL7gotKBv0RNI0d2QER0:Qoa1taC0c07gOKByIE1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5080 35A6.tmp -
Executes dropped EXE 1 IoCs
pid Process 5080 35A6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 5080 1948 c6eb7788a682907485bd590e01b6b090.exe 94 PID 1948 wrote to memory of 5080 1948 c6eb7788a682907485bd590e01b6b090.exe 94 PID 1948 wrote to memory of 5080 1948 c6eb7788a682907485bd590e01b6b090.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6eb7788a682907485bd590e01b6b090.exe"C:\Users\Admin\AppData\Local\Temp\c6eb7788a682907485bd590e01b6b090.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\35A6.tmp"C:\Users\Admin\AppData\Local\Temp\35A6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c6eb7788a682907485bd590e01b6b090.exe 81ACDB95087F6381C121441F49FEDB9FF0001B07F97F0541552108574FC469F8B2355ED6AD3E3100EB3FDB2C1E2AD29239F5E58F091A4F527982DEBFF7268C902⤵
- Deletes itself
- Executes dropped EXE
PID:5080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e368fd6535616be3fb01a074611e42db
SHA126584c97e3cd91e3a8b41766af4cea2bf3eb6c3f
SHA256bf69dce9297feb05b7e1047be30f45e0ac09b253d20b5c6f19181cc1447b7bfd
SHA5128b224f025667ac3182cc3ffbc66aa256144f1bfe6114dae6c800b939eed2024567cc9eb32195a0a47c6acb199bf772c519403e10ece824bb74fe1967858fafd7