Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe
Resource
win10v2004-20240508-en
General
-
Target
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe
-
Size
1.9MB
-
MD5
c2d80eae476141d452c035d209f35388
-
SHA1
cdead61eff83fcc5a02f00c942af3e4eb0126cca
-
SHA256
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937
-
SHA512
cc8769e4c021b013501b38c8c019f09eda6370735dc90f3420f89095bd1fe1060a5c2ee5bc11ac2ea09d93264cf3bbde94005ed6d88283d877f3cb27b795c201
-
SSDEEP
49152:IBuZrEUU5b4+eBTfSd4Ywl4WAmYWbqgMm:2kLU5buT6d9y426tm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmppid process 1420 c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exedescription pid process target process PID 1532 wrote to memory of 1420 1532 c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp PID 1532 wrote to memory of 1420 1532 c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp PID 1532 wrote to memory of 1420 1532 c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe"C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp"C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp" /SL5="$901D8,1084674,780800,C:\Users\Admin\AppData\Local\Temp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.exe"2⤵
- Executes dropped EXE
PID:1420
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-RUDOP.tmp\c13f909db0645fc59028ba6c6b995d26205d7868ab1f303028754a8840d8b937.tmp
Filesize3.0MB
MD5e80bc2b14197bcb114d3375177282068
SHA1a2fc9903fe663369ef20382a1ff86ab00c5b616a
SHA256e4ed2f7d723773fc988a973add360cfca7915b02f657c674da0f20c0185b51ca
SHA5128328f5b790d9a9e66ef2b746ee03706809de2410d7ca1ec68661e2f066d3d30a0a3f20e0b7d5c23772a6f0faea6d372375eeac789864cb46be05b796646567ee