Analysis
-
max time kernel
132s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
Resource
win10v2004-20240419-en
General
-
Target
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
-
Size
79KB
-
MD5
3a68a8a114014f0db88ddd51dd4aa01d
-
SHA1
f015f647472044ba1aee968b6dfcf4d280e3014e
-
SHA256
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4
-
SHA512
09d9998bc42574bd469f959316dcbf8e67f3a96fb7a0ecc9e29b545cff26a492b87b57397ffba83f0fd36b3b868240ec8e9dd0320f61d0817b4e86e74d5ce3aa
-
SSDEEP
1536:zv/kDzjjSOQA8AkqUhMb2nuy5wgIP0CSJ+5yHBB8GMGlZ5G:zvsbGdqU7uy5w9WMyhN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2120 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 212 wrote to memory of 3628 212 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 85 PID 212 wrote to memory of 3628 212 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 85 PID 212 wrote to memory of 3628 212 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 85 PID 3628 wrote to memory of 2120 3628 cmd.exe 86 PID 3628 wrote to memory of 2120 3628 cmd.exe 86 PID 3628 wrote to memory of 2120 3628 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe"C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exePID:3628
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2120
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD50afdb37be14826c25d34727cc8495e11
SHA15e2b8d8f7a1cf30a06fcae7b40e9e744c4548a0b
SHA256ae706b527ea28664ac48fd74415804d38b8938d182003094f6bc8b236dab6a9e
SHA512a7630b5372696c9a6c04c53af27f8a21f597f3c98073c47389fcc2519484e7720fcfc5a15bd636167b683ec5a36116e2b13192d78f21e0201cdccdcee3106aa4