Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe
Resource
win11-20240426-en
General
-
Target
e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe
-
Size
13KB
-
MD5
a35418c997da27fddf1aa66d5d1556ad
-
SHA1
fce6e71d1807e673fa3af340edfc673e0d4b6dde
-
SHA256
e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637
-
SHA512
4d6e9fd6b37cde92980c8424462739c554cf71e88be9298bf76ee68ba3457d968ca0d828ef4bab85a02e9ccb92d2bae98e69ae3fc64ba1c9226e35d5894a9f8a
-
SSDEEP
192:M/zI16ioa1m7Xzk96ZOjcC/Tn7Bkj+sy17P3aJ4BJiGEWlJdxqH8c1xT:cYoJXA73OAfPfEWlJj+jN
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1040 242607070612345.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1984 1252 e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe 79 PID 1252 wrote to memory of 1984 1252 e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe 79 PID 1984 wrote to memory of 1040 1984 cmd.exe 80 PID 1984 wrote to memory of 1040 1984 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe"C:\Users\Admin\AppData\Local\Temp\e8b48c6722a1bda7069bac86018e948de926a6340cbef064e5cc683cf4a7f637.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607070612345.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\242607070612345.exeC:\Users\Admin\AppData\Local\Temp\242607070612345.exe 0000013⤵
- Executes dropped EXE
PID:1040
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD52ab425321acc9e8354ec7a436b1277c1
SHA19ae17f5eb1533f99545e56903d517d8d306f8410
SHA256ef7c81d0d8ab8ac96dd60495aaec1dce978c796684388ee566def28cbb0b04f9
SHA512d8f2fd68f6607b8030543b8a6749f9916777991bae9f969610ca1cf768f395f1688cc0bc30e1b309c20f199a1bba92ffd63788b6c17f3823ca9ff6066aaf3161