Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe
Resource
win11-20240221-en
General
-
Target
82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe
-
Size
16.8MB
-
MD5
ab4adc1957f2c5764e6dcf117c558341
-
SHA1
6232bfe39d653c91ecab229bbb660863ead5fc08
-
SHA256
82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783
-
SHA512
abf912c690b96dea4a1a949ef7f146e8ab8c2be5d8d27880f797415620d43e4fb2bda8158341508b0fac9e226aa0392c2d491bfa2a3f92693a2b033755be499c
-
SSDEEP
393216:Vzwuxq5con7nIWhjXdLbqTNoNhNme9ydizhDdXSE6ispS3dp0X9RidmF:OrIWhu0hJo6tSE6iDAJF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4900 is-E0UKM.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4900 4824 82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe 91 PID 4824 wrote to memory of 4900 4824 82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe 91 PID 4824 wrote to memory of 4900 4824 82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe"C:\Users\Admin\AppData\Local\Temp\82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\is-Q102A.tmp\is-E0UKM.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q102A.tmp\is-E0UKM.tmp" /SL4 $50206 "C:\Users\Admin\AppData\Local\Temp\82002f2385e7bbb38ba88a6479937566d1471e48dd4fa4cc63d9d954c6c64783.exe" 17330181 522242⤵
- Executes dropped EXE
PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD5581bb44526a65c02b388e1b8a83fe86c
SHA1dc387f115977b5fb94d9c9084f33a1c231b50acb
SHA256385a9bb48f5180984867f3bff1d327250d22ab4399137b343be291c370ee3699
SHA512aab4cb6dd5ad4ebfded18748c5cd1a4361c154459f36a4cb49e32855b6866f92d3f065cd9cafa16e621a4216bb176f1554a8bbea7fd458b317eb1ff4c3c2bea1