Analysis
-
max time kernel
133s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe
Resource
win10v2004-20240508-en
General
-
Target
fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe
-
Size
943KB
-
MD5
a1e03626aa75f284be909682173d5ed2
-
SHA1
9c4e6791c9e2431d6157995d14e5070802e26562
-
SHA256
fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7
-
SHA512
f5a5e949f10aaa84e342b3b0c92696ccd14ff6aa2797785cfa82274a14b68e0a6b5964956397842250ebb0070c4da5ca2c71f1d55959d28eb7e2b3129024bd72
-
SSDEEP
24576:GaO+454MwkCRzAH0xw8yK7qKQZLZmP1VUZm1+8S4xQnw:GaO+q4M1CRMIw8yK7C1ZmNiZm1+8S4xT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4412 516C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4412 1428 fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe 83 PID 1428 wrote to memory of 4412 1428 fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe 83 PID 1428 wrote to memory of 4412 1428 fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe"C:\Users\Admin\AppData\Local\Temp\fbcaa52b5ddb48ee32981f22fadc827a2a312b470979fb09a9bc5c232c715ac7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\516C.tmp"C:\Users\Admin\AppData\Local\Temp\516C.tmp"2⤵
- Executes dropped EXE
PID:4412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
943KB
MD5af80439b50ca5c1b189c01fd9c5451ce
SHA191749f407870d4e4f98f23fed6911958e92a3849
SHA2560a02a0e503875056dbe61928ba9a0c0b5ffb64830cc1650046c85b21da083378
SHA5127dcb317a97fa1df624de65f0bfb351db39eab3ad621b6d9406e0322ff0592f3cb503986e5bf92e9a641701b40fefa4c056e8ba35a1d8dddd03f8d8eb6dd65f32