Analysis
-
max time kernel
168s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
caebe2600a300915a228e6d8aea9407a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caebe2600a300915a228e6d8aea9407a.exe
Resource
win10v2004-20240226-en
General
-
Target
caebe2600a300915a228e6d8aea9407a.exe
-
Size
1.5MB
-
MD5
caebe2600a300915a228e6d8aea9407a
-
SHA1
1dbecc65f6fb58a9c491cdc8610df678dab2c964
-
SHA256
cc0b2adddbb325c6351509e9ee55e0740a707b096a7b41996fb5abf219d93ef5
-
SHA512
03c529452323ea2826a1969cd4ff9cd079147a21a59f6f15cd6bed61788426e8edcaa11bdabc38635d1f5b8f8a6ba4a69072ae6a17f1e90f6b79843fee0a7c8f
-
SSDEEP
49152:lrq0R07QQm2l/Iy4clI/URomXWI+oT7QES:hq0+7Jl77lI/UzmIOES
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 19BD.tmp -
Executes dropped EXE 1 IoCs
pid Process 3008 19BD.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 3008 1388 caebe2600a300915a228e6d8aea9407a.exe 93 PID 1388 wrote to memory of 3008 1388 caebe2600a300915a228e6d8aea9407a.exe 93 PID 1388 wrote to memory of 3008 1388 caebe2600a300915a228e6d8aea9407a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\caebe2600a300915a228e6d8aea9407a.exe"C:\Users\Admin\AppData\Local\Temp\caebe2600a300915a228e6d8aea9407a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\19BD.tmp"C:\Users\Admin\AppData\Local\Temp\19BD.tmp" --pingC:\Users\Admin\AppData\Local\Temp\caebe2600a300915a228e6d8aea9407a.exe FF263A12BBD037F72DF073CC2C3ADE34B922975078881B45CF9BCFA8BBD8B046071CE10761700D8B88C78BE545B8C72613057A8FC7F30564D3FCEBA9F07BF2F72⤵
- Deletes itself
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c3eba4aeb5320f25ec79be2e2666924f
SHA168b4218a4804c37e70b41d12c390ee293b5384e8
SHA2564c20dcddffebe2e2e8c8e701fd98becb595f0f20fc5da69d45c2020c52bc0da5
SHA5120a44d9e31d601b4c2257f0a99055f3219c6e92814975213ab7368ab9d04a0628b87b23d8527a1fcfc2cc1b9255102aaf6ae0ef038ee4b8a8f9e9f9936a98f764