Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe
Resource
win11-20240419-en
General
-
Target
f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe
-
Size
13KB
-
MD5
f09e783a6ce7b15b4a79a3d7a10d28c3
-
SHA1
b2e817181d588ccb5366d05bfef58d45cb267d8c
-
SHA256
f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb
-
SHA512
aa5b1e3263990d4cdadb1961b9d084a3f56294c67d7b6387cbecf49b01b1f3f0fbf714614e4d4c70465054dced1b68912de6be8e2e2268b201b22f40eb0ed930
-
SSDEEP
192:EviI1/iYuYtgxG6pfdvvuMs2osxJsUhlLPy2Xbo2dy/9ed9/6CX6+WWlJdxqHbnW:51Y+RH73scl+eJa9eH7XiWlJj+Q
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1504 242607071225310.exe 1516 242607071311529.exe 4356 242607071326404.exe 4520 242607071338904.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4852 4056 f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe 108 PID 4056 wrote to memory of 4852 4056 f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe 108 PID 4852 wrote to memory of 1504 4852 cmd.exe 109 PID 4852 wrote to memory of 1504 4852 cmd.exe 109 PID 1504 wrote to memory of 3544 1504 242607071225310.exe 110 PID 1504 wrote to memory of 3544 1504 242607071225310.exe 110 PID 3544 wrote to memory of 1516 3544 cmd.exe 111 PID 3544 wrote to memory of 1516 3544 cmd.exe 111 PID 1516 wrote to memory of 1012 1516 242607071311529.exe 113 PID 1516 wrote to memory of 1012 1516 242607071311529.exe 113 PID 1012 wrote to memory of 4356 1012 cmd.exe 114 PID 1012 wrote to memory of 4356 1012 cmd.exe 114 PID 4356 wrote to memory of 880 4356 242607071326404.exe 115 PID 4356 wrote to memory of 880 4356 242607071326404.exe 115 PID 880 wrote to memory of 4520 880 cmd.exe 116 PID 880 wrote to memory of 4520 880 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe"C:\Users\Admin\AppData\Local\Temp\f9b9ef02148984cbddd1e7b3cd258f8e3720ace40c0b477001bae71e7e6476bb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071225310.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\242607071225310.exeC:\Users\Admin\AppData\Local\Temp\242607071225310.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071311529.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\242607071311529.exeC:\Users\Admin\AppData\Local\Temp\242607071311529.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071326404.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\242607071326404.exeC:\Users\Admin\AppData\Local\Temp\242607071326404.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071338904.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\242607071338904.exeC:\Users\Admin\AppData\Local\Temp\242607071338904.exe 0000049⤵
- Executes dropped EXE
PID:4520
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4612,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=1300 /prefetch:81⤵PID:3076
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD576f2a5b5c0b917e45ce3552be1431a1f
SHA191913d1ea422e4a1e1147a336d9293cbb757022f
SHA25658d062e388b71511da4a413a5baa57f7f9b2a958a0ad8ca2437ede07612e7d72
SHA512ed051bcd50e8011845cf6a913cf93dd238ea96d3995242d3509c55fe17e1c487b27463e94cdb1330f02020d56ce5b7e931d32dd4680b9705979f616a8d764f25
-
Filesize
13KB
MD589e13f5ff4c510b17ad70b7c1c24a5ea
SHA181a148d7bf8479c1a9339d6491c62fde417c63d0
SHA256918c0efaad8e489c24f8558240c93ee82f3189e2ad6386054e7d815ff7f78205
SHA512f97bf8c8c70169e045e7f814408480addab5eace68c23d3e06c9a3a87ff375c8d4d36a1d6df429cddaa57f0fcfdb568bfb61ccf3251b455537cf31781e4529af
-
Filesize
12KB
MD5ed80ea29dbeb81a4e8820a07c814bde4
SHA1cd7bb55c8333b31f58c8bf585849ae23b66e2e73
SHA256678dd85d5565098cea6f0082e8281a4156ac6b87d3cd385a13f85d8e811f9460
SHA5123f7c52687f8a1558e9b98003b8198aa629aa9141a0328d82132c91cabbf377cf45a001ab65e9a6275422687878e3534bb51ebd6187675870a1c3e9f456982e37
-
Filesize
13KB
MD53ee15eb7f3356a3d9478c2ff9de9891b
SHA193b44cc72f45057b9633bbf2086c576070c52315
SHA256081a0cb4df1940d392170a0ea0e7e4b443c9a74ea408b90e204fd8ffa52e43d9
SHA5124b18a9641f844ade613239851614cc3723692f102fb19ca16b759b44fae198d5a03797eb8d9b6bb50c2524e045fb9958ccc4c43abd38e378a9d5fc31b272c022