Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe
Resource
win10v2004-20240426-en
General
-
Target
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe
-
Size
816KB
-
MD5
13b55cb6496fc371330edd5222ce4a7d
-
SHA1
964f7a4e8559e358c689e218018c3c7dc135eb35
-
SHA256
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199
-
SHA512
5520e6b100062b3f2cc9bcffeeaf4c6af7fe5c891d211d625a0d1e858e53f04426ae4953e553af18abdc995664d80fb6cf9e5e54287d1a51fb589d342610fe44
-
SSDEEP
24576:aY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9O:T3XZynV4oDabuWbDQOcIxJJ9O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1E0E0C0C120F156D155A15D0F0F160F0C160E.exepid process 4024 1E0E0C0C120F156D155A15D0F0F160F0C160E.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe1E0E0C0C120F156D155A15D0F0F160F0C160E.exepid process 1636 a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe 4024 1E0E0C0C120F156D155A15D0F0F160F0C160E.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exedescription pid process target process PID 1636 wrote to memory of 4024 1636 a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe 1E0E0C0C120F156D155A15D0F0F160F0C160E.exe PID 1636 wrote to memory of 4024 1636 a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe 1E0E0C0C120F156D155A15D0F0F160F0C160E.exe PID 1636 wrote to memory of 4024 1636 a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe 1E0E0C0C120F156D155A15D0F0F160F0C160E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe"C:\Users\Admin\AppData\Local\Temp\a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\1E0E0C0C120F156D155A15D0F0F160F0C160E.exeC:\Users\Admin\AppData\Local\Temp\1E0E0C0C120F156D155A15D0F0F160F0C160E.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD526112e62673bba5ce3c7aab7d1b00a8a
SHA14a8c93cd69a6fdb37c6e6c3c1e0f286c735e6fd7
SHA25688bb6e7ec19e502212070fef695ad4b98169915794bd1c7f858a5e03d7cb5e20
SHA5122962491c348f8afe4b6f3b5bf2212357407a474ba7cc5f9a7ae9660bcbfe087454490463fb927d4362684669ddaeb0f465649760d1d98d98e77555727aa0d38b