Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe
Resource
win10v2004-20240611-en
General
-
Target
ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe
-
Size
2.0MB
-
MD5
76bd7bef106017beef5d6a9a2f808126
-
SHA1
751869e8311f492df1a6ab46c1ffa217899c65da
-
SHA256
ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c
-
SHA512
0423f0665220fb11d054260604df5e1e8d0dfc1d3824cd32ea385a70cfbc540a3aa5c58052f5d8ffea2dfc28985dddf9e71f0ac13c7ffe9dc90f6753d95af357
-
SSDEEP
49152:4iCrJIy7f+t3spvOqA9Ymd0AFu7FCSxwm:4iTy7yc1OqA8+u7FpV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp -
Loads dropped DLL 2 IoCs
pid Process 2916 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp 2916 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2916 4364 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe 81 PID 4364 wrote to memory of 2916 4364 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe 81 PID 4364 wrote to memory of 2916 4364 ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe"C:\Users\Admin\AppData\Local\Temp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\is-39HRA.tmp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp"C:\Users\Admin\AppData\Local\Temp\is-39HRA.tmp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp" /SL5="$B0174,1293211,746496,C:\Users\Admin\AppData\Local\Temp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-39HRA.tmp\ebab0de98f07f25b3a6e984eff5e397d875c52c1cf761749d7f562d97a65254c.tmp
Filesize3.0MB
MD5d0c0822356cbf0aafef8ad7aa52a4c10
SHA1468ccb287518bed27c390b3883379d7d0c2179e3
SHA2568681595f8ed85cf611ef9a993f3a3eca793e435d7105bb628a3e33503b64583c
SHA5128181fa384aa2d3b36d40522fc71e91ce55aaca44a976d62fd0fcdc31c61e61ceb55c78876d3874c8dc23c8ace6abf198dfb24eb0a3738ee6beda0511bdd5069e
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547