Analysis

  • max time kernel
    141s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:42

General

  • Target

    AcrylicConsole.exe

  • Size

    445KB

  • MD5

    7cc20e36ce5992ac1d41a4719c9a6e31

  • SHA1

    941900adfd85a1823a2f58ae15b76036a4862ed3

  • SHA256

    10b65511903694caebdc48a6301912d6e220e1101528800fca18db6b48f515f4

  • SHA512

    b14edb1bd0ded697adeb81e6b4739289ad101bfc72ef5a52e25d4cb486ade667958bcd5f89da2ffdf9d10021f4d5e878608cb0e241e6ea1cad7f9afb7490ec2a

  • SSDEEP

    12288:M+vnuCQI8OPfzFqOTRQxai1DeIHngCtf:MI/QqqOl4nlQCZ

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AcrylicConsole.exe
    "C:\Users\Admin\AppData\Local\Temp\AcrylicConsole.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\IpConfig.exe
      IpConfig.exe /All
      2⤵
      • Gathers network information
      PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1244-3-0x0000000000400000-0x0000000000776000-memory.dmp

    Filesize

    3.5MB