Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe
Resource
win10v2004-20240508-en
General
-
Target
acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe
-
Size
6.0MB
-
MD5
0b1b9ba5bb9a13721898fd101c37a83e
-
SHA1
161b56707fcead8bc5943d38a1169001812aeda4
-
SHA256
acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f
-
SHA512
f6c9d59bde873ae9bf790024330afd24573ab8aec25656c6f363890e16740cfae892b0055a01c0d4247ad34eef95d34f9bbe268e0bc72f2f28ca84b77882d717
-
SSDEEP
98304:emhd1UryeB1nT6rl4qXYWkM+SlcK3AaV7wQqZUha5jtSyZIUS:el3T6rl5XYWr+gjAa2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
E8BA.tmppid process 1008 E8BA.tmp -
Executes dropped EXE 1 IoCs
Processes:
E8BA.tmppid process 1008 E8BA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exedescription pid process target process PID 3848 wrote to memory of 1008 3848 acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe E8BA.tmp PID 3848 wrote to memory of 1008 3848 acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe E8BA.tmp PID 3848 wrote to memory of 1008 3848 acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe E8BA.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe"C:\Users\Admin\AppData\Local\Temp\acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\acd6f0187dee06eda6af7ab65afabeb40b9c99b51d84797e07be068d9a88812f.exe BBB4E2DFD2CB1C6CAC93D15ED8CAC7EB2A6EC290744B063873FE13540C76F87DF3E0E17B3C91D6D7235BBB05B414789A17E5F3F286B82C1E1F1FD82389A99FC72⤵
- Deletes itself
- Executes dropped EXE
PID:1008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3896,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:81⤵PID:3580
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5e46e564ef9160edc36e28e29cbf6feed
SHA1f9a9280aaf1160b1ec507f33662d15caefbb07bd
SHA256a1a9cfa04fbbe8e4a074d512a22e8c8c6dcb695ee00570c9974177d3211d7053
SHA51203570393f45aaca2e4f39e9acd81cdb8b847c5f7053bec19a144c189c46690b6c347c410edf7b90004a43dd031ec43a9215d5ecfa50e180420135e0fdf1c13f1