Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
c74b17a69bbe4cf33b28185dc3a840eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c74b17a69bbe4cf33b28185dc3a840eb.exe
Resource
win10v2004-20240226-en
General
-
Target
c74b17a69bbe4cf33b28185dc3a840eb.exe
-
Size
505KB
-
MD5
c74b17a69bbe4cf33b28185dc3a840eb
-
SHA1
9c5e9bd72c8635a10753bb620e566d592cabebe0
-
SHA256
05c1f9dfc4b11ed3ba8245669dc103f0dfdfbab8e6fc7bd575bd4f63b17981b5
-
SHA512
1aa3398db182520587d5731b2941227fac2801d2a7a739e11e21c3f9d1f78234f54fa0f5841104f6cf8ff4a29c3de00a607f97960fd8695871a4ebd7d602501f
-
SSDEEP
12288:HSxG05888888888888W88888888888/4khP50GG7/uuzggp6NMWfpRoNtqJPBf:yxGY70G6BzzwNMWPPV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 c74b17a69bbe4cf33b28185dc3a840eb.tmp -
Loads dropped DLL 1 IoCs
pid Process 2860 c74b17a69bbe4cf33b28185dc3a840eb.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2860 2168 c74b17a69bbe4cf33b28185dc3a840eb.exe 91 PID 2168 wrote to memory of 2860 2168 c74b17a69bbe4cf33b28185dc3a840eb.exe 91 PID 2168 wrote to memory of 2860 2168 c74b17a69bbe4cf33b28185dc3a840eb.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c74b17a69bbe4cf33b28185dc3a840eb.exe"C:\Users\Admin\AppData\Local\Temp\c74b17a69bbe4cf33b28185dc3a840eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\is-1O4MR.tmp\c74b17a69bbe4cf33b28185dc3a840eb.tmp"C:\Users\Admin\AppData\Local\Temp\is-1O4MR.tmp\c74b17a69bbe4cf33b28185dc3a840eb.tmp" /SL5="$C0066,127487,119296,C:\Users\Admin\AppData\Local\Temp\c74b17a69bbe4cf33b28185dc3a840eb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD54de6f44810bad050ac81f45549d58f34
SHA1e001b982a0a978deed96789f943bf295dd2ba1d8
SHA256cf8a77f4cbd38f6ab44fcff738f81ec8dfdaa7ef5a64d62fdd84c6fe897adff5
SHA512550e468c3d6660ce2030fca16549eace9153610e19621cba83fea691f8d0091edb596a869168cf4b7f80fa55a808ca1703e4e2beffb3ade5af3fb67b6ead6673
-
Filesize
15KB
MD52ea92b11633afadba96648666b9df024
SHA125cae5012a8fe86c34e5918613be3fc4e7480fbd
SHA256ad04e5eeec0ed157c4c6c5a1b919746e04d6270a15d8d6fb192bbc566d2fd3d7
SHA512dd85de944271aa333d9eac175bd2167c5cb8771ece679af888a96e340dd5f1728ad3e3f9209546f5e17f22e91a9659e7168e12a7935ab4820e135a9f1f534471