Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe
Resource
win10v2004-20240508-en
General
-
Target
88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe
-
Size
79KB
-
MD5
1f8826fb47780d2d8726804fb8668331
-
SHA1
88d33f0e6a89a4d4e5f498a1e393d7e661b812e8
-
SHA256
88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0
-
SHA512
835016a2d5b2c67a76be9460c94b720bf211219381e3e5e5ee691ca59704363416c1b9e75b058696e4dae51eadbaf01137a80f691e75f2505188a8137871e320
-
SSDEEP
1536:zvDsG4JxfZRe6RIFnzUmJfOQA8AkqUhMb2nuy5wgIP0CSJ+5yZB8GMGlZ5G:zvYc5zpJWGdqU7uy5w9WMyZN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2780 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.execmd.exedescription pid process target process PID 212 wrote to memory of 4356 212 88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe cmd.exe PID 212 wrote to memory of 4356 212 88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe cmd.exe PID 212 wrote to memory of 4356 212 88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe cmd.exe PID 4356 wrote to memory of 2780 4356 cmd.exe [email protected] PID 4356 wrote to memory of 2780 4356 cmd.exe [email protected] PID 4356 wrote to memory of 2780 4356 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe"C:\Users\Admin\AppData\Local\Temp\88a9df4193b354162c0c89650df8b6de4fd63c855c5dd459e683ee86347969c0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exePID:4356
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2780
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5c5955db7f63d0303189aaed6a600ded8
SHA1e63f87e38a092da1b4481adc37ca654e26568abb
SHA25680de5f2d32968698d693ab432faf36100360d4dbe5ddfe4274cd0077dc4279c6
SHA512147de7fcc1be8ca59e4a883bc81dfae9da0d14ac934c5d35e2feb0de80928f56fccaaef8a32fb4169dc21b35131fbd497aa0758a1ad5a37c8f0660a18b644334