Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
Resource
win10v2004-20240226-en
General
-
Target
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
-
Size
79KB
-
MD5
621b230cc625b651f3e854399b25ace6
-
SHA1
a2dc0ead824fdd894cb4326908cb2d74b7df51d5
-
SHA256
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f
-
SHA512
2e3efa4597837ad4fa65cb3943f7f2e5f5943d3529f3849f95ec11b28548a385f8d6c9060f999af37ebdd8b531636aec23a26b785da7f95d59601caf87da498d
-
SSDEEP
1536:zvQFxWrhuqoWnMxOQA8AkqUhMb2nuy5wgIP0CSJ+5yAB8GMGlZ5G:zvQFx/0MAGdqU7uy5w9WMyAN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2088 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3756 wrote to memory of 224 3756 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 96 PID 3756 wrote to memory of 224 3756 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 96 PID 3756 wrote to memory of 224 3756 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 96 PID 224 wrote to memory of 2088 224 cmd.exe 98 PID 224 wrote to memory of 2088 224 cmd.exe 98 PID 224 wrote to memory of 2088 224 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe"C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exePID:224
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2088
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3472 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵PID:620
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD520f729bcad3f1c104221dc0088c2c604
SHA1a5355620f7e85c976fdbdbbec0df853e5f72012e
SHA256cd5c0f83d2a809ce1ad3a093f4f532bcb465d94fc3608f417762bccb999cf985
SHA5120aa327dd74278d5190b0fea91a358bb474b15c6c6c43b36453829c29c000d90d23ed15fdf6c9a0b4b9686d51127ea52afc27429810c4de4dc7020e8020f843ac