Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe
Resource
win11-20240214-en
General
-
Target
d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe
-
Size
1.8MB
-
MD5
65f96d571e39f570660efd016410e127
-
SHA1
f52e332525797b4132af62698c9ae9504437485a
-
SHA256
d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79
-
SHA512
a82859508c118c3507d9d359a9a4c9ffafbed937a177d554c370ca4fee4113e7dd0e0f8d1e77074edcf7fad7bfb51ab96631a45ab7d64405244f744df7804a63
-
SSDEEP
24576:X7FUDowAyrTVE3U5FVbLIusQUHmSYMOk492NIFl33eaSxvhf/19kt6C41NeCG0Tj:XBuZrEUxvIrNMMOGCl33sxv9kt660Tj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3844 d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 3844 404 d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe 76 PID 404 wrote to memory of 3844 404 d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe 76 PID 404 wrote to memory of 3844 404 d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe"C:\Users\Admin\AppData\Local\Temp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\is-H6G1V.tmp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.tmp"C:\Users\Admin\AppData\Local\Temp\is-H6G1V.tmp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.tmp" /SL5="$60202,989184,989184,C:\Users\Admin\AppData\Local\Temp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.exe"2⤵
- Executes dropped EXE
PID:3844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-H6G1V.tmp\d67c0dc0b3df53bf9fc5fcf9564a1f73634bd919bd6763c1813c1b4190700a79.tmp
Filesize3.2MB
MD55ca5db486a1fd6b2d96f52346a847054
SHA10797f40bbbbdc41eb22906b1450a5d60e40967b5
SHA256ab64b82d560b73cdb799c491045f7432bc20e5976fd430f3c020c60b92b19386
SHA51292e7312a59e611ef4e942faebd9c4b49b9c24a864879afe0ce6916a1fefb02e0dee9117e31f4a7e2c84738ec38a2d008fb7bf91575ba8045487e0ee3541bca7b