Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe
Resource
win10v2004-20240412-en
General
-
Target
4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe
-
Size
816KB
-
MD5
c39280e5714dd7576e07d38df3c79ca1
-
SHA1
38facfe844802a32af6522d6f9873a392a268f62
-
SHA256
4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48
-
SHA512
553f6bf769bcf2f9e43f78e264ed10bd5082b069e1b6a86ca35ef34cd991da1c7fb5c80e581de2c94e78c183819f9eaf3822676814ccdcbd200e641dd475dda8
-
SSDEEP
24576:2Y4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9C:X3XZynV4oDabuWbDQOcIxJJ9C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 1C0C0E0D120A156A155C15D0B0F160D0D160B.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 2568 1C0C0E0D120A156A155C15D0B0F160D0D160B.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2568 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 28 PID 1924 wrote to memory of 2568 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 28 PID 1924 wrote to memory of 2568 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 28 PID 1924 wrote to memory of 2568 1924 4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe"C:\Users\Admin\AppData\Local\Temp\4d6e05a3fcc652ec481a38d462319e083d8f58078f37f8d4f613502e9be00a48.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\1C0C0E0D120A156A155C15D0B0F160D0D160B.exeC:\Users\Admin\AppData\Local\Temp\1C0C0E0D120A156A155C15D0B0F160D0D160B.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5a664ba92e5127e07f46801a41cb0615f
SHA18f59190a5a827b1e294484314cd82a66b98560df
SHA2565d47718295426217ae37712f5e08219b6688a4a64d674963f3ba360585b60cdd
SHA512b9b6222ef6aaf2a25543742be94f8a5e6259b532716ad5a0b0ec63467d385204066ace150656d53c66217f395e56d0219e0f98eaf4f8b57a887196f011d5a49f