Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e14369c7d679e6578635020624468c98.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e14369c7d679e6578635020624468c98.exe
Resource
win10v2004-20240226-en
General
-
Target
e14369c7d679e6578635020624468c98.exe
-
Size
1.9MB
-
MD5
e14369c7d679e6578635020624468c98
-
SHA1
a0a83b99e0669ae935100ad55315b67e68842b71
-
SHA256
615d453611e92a205875ed431633a96104537e3b1b50a7d8e897d1e5dd04191d
-
SHA512
4947647a620c23d08d0ac884c819aadf183bcfc7a071e924b95adb6948a15fce252565279963548f9acb27a8020d0be6699258c61cc8a0cc4127e509e82cf259
-
SSDEEP
49152:Qoa1taC070dv8jhUnFvAElY0SFCnBDsEr+:Qoa1taC0RNu42Yt056
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5912 145E.tmp -
Executes dropped EXE 1 IoCs
pid Process 5912 145E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 972 wrote to memory of 5912 972 e14369c7d679e6578635020624468c98.exe 98 PID 972 wrote to memory of 5912 972 e14369c7d679e6578635020624468c98.exe 98 PID 972 wrote to memory of 5912 972 e14369c7d679e6578635020624468c98.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe"C:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\145E.tmp"C:\Users\Admin\AppData\Local\Temp\145E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e14369c7d679e6578635020624468c98.exe C83B3B3FFABF8671EC05616A5EB9EE9CA8B90C484325FD43E8FED897F7390F2F140C059F5F3C11844DAD2EE55998277E5299ECA7296F3B1E2387DA7CFF128D822⤵
- Deletes itself
- Executes dropped EXE
PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3944
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54df55649a84cb9f34dae23f6d2bbe13e
SHA107ce566ea22680e42caafb243e732284a416fa17
SHA2563abbb6d35a13eee834dabeae85a8ee8b371d9f2420650829aa0b6f3b3b2bdbca
SHA5125702984d8b4a68f34a7464f0bf36e08795dee1db69bfe8cab86ab3b621d55d60be0b6e95741c8a680904e708cfdbcf000a82a7260d2f6f4aeb4886bd7030e3e6