Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe
Resource
win10v2004-20240226-en
General
-
Target
2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe
-
Size
796KB
-
MD5
87d79fc4fca499fe897f66da46b00e5b
-
SHA1
a1615b7cf6fbe1041db729c654b15a7a5797e940
-
SHA256
2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99
-
SHA512
825c88f71aeca5c8289ac0d94accfb5876a29ab3301e0d2d7ffa2d870a53f6998f0f2ca67bed46e7794d85c704a517437399a436d47dc32c592af892eb9e40f9
-
SSDEEP
12288:HJz0eysF3ikNgyhk+YC4DqEfFX4UWRfR50kFiGcSroPX/h4j3depPu1P4Jxf+:HJz0Q32wktqgHWvGNpPXZ4j3depPuYk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 1B0D0D0A120F156C155D15B0F0D160B0C160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3028 2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe 396 1B0D0D0A120F156C155D15B0F0D160B0C160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 396 3028 2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe 94 PID 3028 wrote to memory of 396 3028 2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe 94 PID 3028 wrote to memory of 396 3028 2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe"C:\Users\Admin\AppData\Local\Temp\2aa3936c09cf67cb6b4ddb068509ecba7b590ab8a70baca4b613b871a08d9d99.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\1B0D0D0A120F156C155D15B0F0D160B0C160D.exeC:\Users\Admin\AppData\Local\Temp\1B0D0D0A120F156C155D15B0F0D160B0C160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=3112,i,1786399861560734457,5606877702857066305,262144 --variations-seed-version /prefetch:81⤵PID:3684
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD59cc5ab56315e746d1fa8c105912ee192
SHA1d524b4e53d8cf795c1ce5bce7afee73e1cbf7040
SHA25647979944d4eeb81e1767d96139e79c897b8de4bf9515e87a9c0d61307ccaaae0
SHA5128978ec315d452a0b46f55a82d3cddffdb37c6d16f0fbb2a310af0ba949b454b2d33d1d99e7c654d3c52b66dd7c08dd0fad009ef9a43ceec1d05b448e3081fc63