Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
682a2ea9a570e20ead208293725ff2b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
682a2ea9a570e20ead208293725ff2b0.exe
Resource
win10v2004-20240426-en
General
-
Target
682a2ea9a570e20ead208293725ff2b0.exe
-
Size
955KB
-
MD5
682a2ea9a570e20ead208293725ff2b0
-
SHA1
1767b9747ea7df2b36c3f30da6f74ab0e01a36e5
-
SHA256
2c1ff8a86c36f584fdad32eb22e205892227753f4a08c355fe55ba55bfa11b59
-
SHA512
7b924d921cea64dfd118dc59da06705145760168724953545100fdd820fe7c3df0161e33a1a7ffa3a507f6f55ad0853b5769671592425de327d00556e04307ec
-
SSDEEP
24576:oTEKr+lQNNVOUN5mKnkHz2agLZmX1+RnM3L2N9Y3G3wSK6JE4t6FGerrthf:oTEKr+q4o5iHaasZmF+RnM3L2N9YWgSO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3136 37B9.tmp -
Executes dropped EXE 1 IoCs
pid Process 3136 37B9.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3136 4748 682a2ea9a570e20ead208293725ff2b0.exe 82 PID 4748 wrote to memory of 3136 4748 682a2ea9a570e20ead208293725ff2b0.exe 82 PID 4748 wrote to memory of 3136 4748 682a2ea9a570e20ead208293725ff2b0.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe"C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\37B9.tmp"C:\Users\Admin\AppData\Local\Temp\37B9.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:3136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
955KB
MD5736a1b3e5a7b3d57f2fb554c36f6d3a6
SHA188f91d6c25f7d5a59193a045df84881e0517e6aa
SHA2567a399892c98f03e97edfaa225fa9127e89dffafc48ab413dbd9bb80644befdc8
SHA512481beb9ef010b54a8cc3fbbfbb6d1c459694b0072df7af93d1e009ad3330ed8f2b3cdc912c51ea2b747a715a3820906c66e227d6a9480b4e40631b88484dfb2a