Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe
Resource
win10v2004-20240226-en
General
-
Target
573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe
-
Size
816KB
-
MD5
7916845c1a5d0d14461a8b836f5e6f0f
-
SHA1
51d577886e00582b0911777311f3e60e71530b12
-
SHA256
573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80
-
SHA512
8f62a8c21a406bb55e97a7c3cff8fcefd3d20fc0adaf842a0673dff3ecb175ac4fcb2982d5de03e5ff3b02e54843c80fa569c33a1cf08e8f47cd863a6bd3129e
-
SSDEEP
24576:vY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9O:A3XZynV4oDabuWbDQOcIxJJ9O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3236 1F0A0E0D120E156D155E15E0D0E160D0B160C.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3544 573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe 3236 1F0A0E0D120E156D155E15E0D0E160D0B160C.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 3236 3544 573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe 91 PID 3544 wrote to memory of 3236 3544 573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe 91 PID 3544 wrote to memory of 3236 3544 573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe"C:\Users\Admin\AppData\Local\Temp\573996364ca1c3d766e9786c702305cdc3af1e21e02856c6da65e659c6557f80.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\1F0A0E0D120E156D155E15E0D0E160D0B160C.exeC:\Users\Admin\AppData\Local\Temp\1F0A0E0D120E156D155E15E0D0E160D0B160C.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5488
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5f1d4623241a88739b552b447c6f4877d
SHA10bb328de49bd05a77c0218791de764f43a084b3e
SHA256606cdf1cf4412495488828e6f539f78cbfe2a0a5755830bcfa7cdda965fd1ea7
SHA5125c1cb6e3391997c33a67b314ee249b6f4557f2f6763fd82e860021a8e53928fe3a41b31993acefee87b932822ce2f8f6d9b20b1fb471562772f56326dd347c49