Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe
Resource
win10v2004-20240226-en
General
-
Target
ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe
-
Size
79KB
-
MD5
65859d66b79d49884f1ae0ea07da5cf6
-
SHA1
978448a2587f4afdfbcb2faa2aec3cadf3006419
-
SHA256
ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76
-
SHA512
5cb511bfecc0a0139ed0b3c7fe29075d6c45af32903f0104f2779b7b14adf575eb47b9c50f824f880e8a1d0832a47ae4d8591c75bf0eb95fa0fab3e4fe4984e2
-
SSDEEP
1536:zvvSjrPgawlHWzMLP0OOQA8AkqUhMb2nuy5wgIP0CSJ+5yyB8GMGlZ5G:zvvSj8aKHWgLP0bGdqU7uy5w9WMyyN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4812 2324 ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe 89 PID 2324 wrote to memory of 4812 2324 ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe 89 PID 2324 wrote to memory of 4812 2324 ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe 89 PID 4812 wrote to memory of 2636 4812 cmd.exe 90 PID 4812 wrote to memory of 2636 4812 cmd.exe 90 PID 4812 wrote to memory of 2636 4812 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe"C:\Users\Admin\AppData\Local\Temp\ab96831de06890545a6aecf3a2a5763f9ad8e4416064e27cf818d35ce2f0df76.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exePID:4812
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2636
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5bcdf2ed39cb2bc85cb1cbdaf1d788998
SHA1f9dd754368db2c8e66009fb21533a6171cd185a7
SHA25678639800e0b2fcb87000d2bd1c0c5d34df33581f8e49fb83257a0cddba583d61
SHA512c793e14a28b131859f88a1db16257843edbc26093713b075cee7406cadf30f92af568a0dbc32b9c389a10739772a67b4a7f95ea9c9a7ebbd7828d16b3771eb25