Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
Resource
win10v2004-20240508-en
General
-
Target
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
-
Size
5.4MB
-
MD5
bce4e3991fb5801d380a4ddd003956e2
-
SHA1
5e936e486a6b80ee37491734ed67d84cd23e7334
-
SHA256
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c
-
SHA512
f155f9a7ac8c2bb87fd5f81234f335d8cee32019077424f54280e1ae01d85218b16f002b605de88dc4793d4cc42f8b7c9d0607df197584147de97fd43b7d674f
-
SSDEEP
98304:emhd1UryeDOtmR4f7ixp2IYV7wQqZUha5jtSyZIUh:el/OfGxfY2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
46FC.tmppid process 640 46FC.tmp -
Executes dropped EXE 1 IoCs
Processes:
46FC.tmppid process 640 46FC.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exedescription pid process target process PID 2508 wrote to memory of 640 2508 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe 46FC.tmp PID 2508 wrote to memory of 640 2508 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe 46FC.tmp PID 2508 wrote to memory of 640 2508 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe 46FC.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe"C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\46FC.tmp"C:\Users\Admin\AppData\Local\Temp\46FC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe D67C385BD648407A3F9EF24D48E2DDDF87AAD70ED79FA913E7667AFD4B320FB5B7C1EECAD8A850B390E86E74E017971AB71A88A7635B12E74516C189D4A68A8F2⤵
- Deletes itself
- Executes dropped EXE
PID:640
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5d515c5a8753b770abe253ed0e537ca74
SHA19b6f53f84a06e4287ea1cc0af30f138780132043
SHA2565090a4941f14576135d4c4f22364672dcdfb061e93027fffe65363696f38b926
SHA512dc08edba65bb98dfc30488ca256c59812fce68db2f981b321bcced9b856ef3c3bc98ebac11cf71d8f9d64eeef809f7caffd9a77ce2591072be99cfb41f0a64d5