Analysis
-
max time kernel
120s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
Resource
win10v2004-20240412-en
General
-
Target
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
-
Size
7.0MB
-
MD5
7dc63389fb7ec3ba530b0bc5070b99b9
-
SHA1
273234f36351a68f8cf16e710962666e47f7ab8e
-
SHA256
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145
-
SHA512
b12ae0d93b65bad7c86333d3741f36f90d5240a5b1df4d4f86776bc8e6c1b629c94860977ff25a4cb26d49e39390077778de9ff966645c64420360719d802a20
-
SSDEEP
98304:emhd1UryetYPn+4CPmjhEdApV7wQqZUha5jtSyZIUbn:elNYP+T0Edc2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3308 4F15.tmp -
Executes dropped EXE 1 IoCs
pid Process 3308 4F15.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3308 1008 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 94 PID 1008 wrote to memory of 3308 1008 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 94 PID 1008 wrote to memory of 3308 1008 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe"C:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 0FE35C00E1CA3661362AD1C6685923B6352BC61F7D6F7242209075135063499773C69D02CCE9C8BADD9FFC9FA805DFAEE96ED3226E6BCDAA7DC8F41C50DE060A2⤵
- Deletes itself
- Executes dropped EXE
PID:3308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5834d23c4df90fbb9817a8b1939ed2dd1
SHA118294aa0c52535eb56e06a43c23aaa1025a21786
SHA256fc5b04d26378e321fc8c210c9441db74d2402d7ab814c6e04ad04fda455308aa
SHA5125e62e7e431cd225d48de5a892345ea457c48aae1a4f53dbf38eaf30705ba66588de98b9c0735017e247c1496ac21de36d131db1b40d011bf9cd3871a60ac11f2