Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe
Resource
win10v2004-20240226-en
General
-
Target
a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe
-
Size
79KB
-
MD5
bda57b1caae88b416e2fdb3a160d17ab
-
SHA1
c5bbee93a12f0f3c6bba6495aa0bf82e530f9d77
-
SHA256
a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c
-
SHA512
6c101eca1c383233ddfc0cdd775b6c6a3a34b67d9e8b125f63be7a6ec3d78ba805ef6f33e9bd42d7e57137b1b4547710bb625d1c9b92101a59f39df632640bf4
-
SSDEEP
1536:zvJRAT+S0kaNVu9TOQA8AkqUhMb2nuy5wgIP0CSJ+5ymAB8GMGlZ5G:zvJR6Z0FNVuUGdqU7uy5w9WMy9N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4668 4432 a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe 90 PID 4432 wrote to memory of 4668 4432 a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe 90 PID 4432 wrote to memory of 4668 4432 a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe 90 PID 4668 wrote to memory of 2160 4668 cmd.exe 91 PID 4668 wrote to memory of 2160 4668 cmd.exe 91 PID 4668 wrote to memory of 2160 4668 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe"C:\Users\Admin\AppData\Local\Temp\a6bb41cad03135c16693a0e45b80b6403727d3b7c068b1bc8a618ee0660bf92c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exePID:4668
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2160
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5fbd5f9a76da1ae84fb8307d9d63ea677
SHA14b8a9903f7e2bfee05d27bb831571be17f4bb5d2
SHA256920e74c4ebe5bd67e28b0e50f89b68de15443f8b96dadb67a0656e09dd748ea6
SHA51213d6223c6e3736bba93920f2569b7dd05e24c2799aef9f7f70b0c95d0573dceaf8032148139ead7eaf52d50454ed5bc102f47bc79b713e697c478a7d2626dd20