Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe
Resource
win10v2004-20240426-en
General
-
Target
80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe
-
Size
7.8MB
-
MD5
f38651573d5bd7795ed082e618b12b4a
-
SHA1
86629d876002950ec0a6e615b07b4340cdc9f4df
-
SHA256
80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f
-
SHA512
797dfba42bb8acab9fe01551ab5ddae962f50e3993b01e7e242c93447e22ede71964814851950b47c934d4bca76a997804f1d24bbc2d7e91266f63c4fb6645eb
-
SSDEEP
98304:emhd1Uryeu0vr8Sv7zfJgV7wQqZUha5jtSyZIUb:elO6gSJg2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
7CA2.tmppid process 3752 7CA2.tmp -
Executes dropped EXE 1 IoCs
Processes:
7CA2.tmppid process 3752 7CA2.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exedescription pid process target process PID 1128 wrote to memory of 3752 1128 80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe 7CA2.tmp PID 1128 wrote to memory of 3752 1128 80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe 7CA2.tmp PID 1128 wrote to memory of 3752 1128 80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe 7CA2.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe"C:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\80a6ce9239154605dc25c0accf35a311f08e1d5d20404ae64abe54995d46de0f.exe 68B4AB225EF0A653899DF57F6E68AB46B9C3B550B89E94E8610D64A358A6C1CD92E828D59FC983F5009A8A1DC79C85EC28B81C4CD615148714766414FBDF5EEC2⤵
- Deletes itself
- Executes dropped EXE
PID:3752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD51876ad1f417d2e49df396f7aa1b9821c
SHA123646edd57679d17b27963737c74c81e63a3b262
SHA25607f2146ded00f20966db72ca1ad893d1c6ce521258bbf94f3cb119822ea995e6
SHA512d23d2fcde19a6181ad0be44629cfa06dda3498c7cd87a0b5256634fcd12c99e961093e62479b91a3945fa9546b1e30e9d6d2440fba148f4dede2cc943eb53a0e