Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe
Resource
win10v2004-20240709-en
General
-
Target
fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe
-
Size
6.4MB
-
MD5
acada4701c8eab12f8aa14676588a89c
-
SHA1
adf890a69a038bf4bfb09aa925829b2242be01c9
-
SHA256
fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31
-
SHA512
754bcdbe9fbe2d15b822d89e2f4aea37cca12cf4f748bce5207f542301c2667bf91d8192ccb3fcf87583a1db5fd4c1d1eded25499ed646cbe93660832f741759
-
SSDEEP
196608:tB4yzOMQONH9Xs+tah6EAo+LcsYhxT/vVli53:kq1dXs+Eh6EmIHhxT1l83
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1928 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp -
Loads dropped DLL 2 IoCs
pid Process 1928 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp 1928 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1928 3308 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe 85 PID 3308 wrote to memory of 1928 3308 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe 85 PID 3308 wrote to memory of 1928 3308 fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe"C:\Users\Admin\AppData\Local\Temp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\is-PJE2V.tmp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp"C:\Users\Admin\AppData\Local\Temp\is-PJE2V.tmp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp" /SL5="$901EE,5863008,770048,C:\Users\Admin\AppData\Local\Temp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
C:\Users\Admin\AppData\Local\Temp\is-PJE2V.tmp\fbee8de262f533397965c4dce409a06cd639c2dacc06175f8277139f3a1f3e31.tmp
Filesize3.0MB
MD5c6c8bd6c3326acf593ab443dda390a65
SHA14b4c0cc8bc89bc118592b36bd7f29e068b712358
SHA2566a4327b1ce679a59303ead8d0634f586117c3527a548fda3bf9474d0f34ccbce
SHA51243cbe12dc54c9a1a26292537c4ab652196e7e435a90fd093feae3d482ac1688df19889609f9da768e5c84b093572e8522b787ed110000f86edbddbb3929aac94