Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe
Resource
win10v2004-20240709-en
General
-
Target
ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe
-
Size
6.0MB
-
MD5
81585d9e034d6f9f99c1f45ba585f8c4
-
SHA1
9fb5f145d78f85f57b70c89b475dc2335c69c482
-
SHA256
ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73
-
SHA512
dc7694eedcb84034280ba067e663b4397221e8627105c4d8af3ff15fde99f08ff3a937bdfce8cd06bb0900b507406ae61be1571b109eb98251a2df2a61730117
-
SSDEEP
98304:emhd1UryeMDbF0ivGcEHZPV7wQqZUha5jtSyZIUS:elst0l5HZP2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 488 9114.tmp -
Executes dropped EXE 1 IoCs
pid Process 488 9114.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 488 2648 ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe 84 PID 2648 wrote to memory of 488 2648 ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe 84 PID 2648 wrote to memory of 488 2648 ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe"C:\Users\Admin\AppData\Local\Temp\ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\9114.tmp"C:\Users\Admin\AppData\Local\Temp\9114.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ea9b1060d59cf6a5e036752c9394e1ff17dc4470a7efb89e8dc04cc837a43e73.exe B73C602D351AEAAE75029516DD4ADC882BF08ECBF377DE0EC087D0946B88BBDC2C567FDEE6FA664BB47E9BEEE247CC5D40B91962E26EAC7B02160C4F4575C6D82⤵
- Deletes itself
- Executes dropped EXE
PID:488
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD50341b17f604b80be87e4f57b472b6773
SHA1c3209fc7746ca04a4904125db9a590313e42cab2
SHA2563840c55e6d0decf7072830c712af10e768cdb1a105af0ccabaf9cd9c22e53878
SHA5124fca179c57a1bebe6c790029149e93dab6b13924e3f012af971063f62e194a087d6a0fdcb8ab27ee17c0b7181cf4c39d7ecdcfc361d84a0cde9844a30324842d