Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:18
Behavioral task
behavioral1
Sample
a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe
Resource
win10v2004-20241007-en
General
-
Target
a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe
-
Size
7.3MB
-
MD5
405f364a4ea973233a1f8917de45674e
-
SHA1
ba23d56e137135922633247cda41f48369b4c469
-
SHA256
a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034
-
SHA512
29b3d8b3343f6a86a9fffca1f040db5e91c52b90221c01047464f7ce5b77f9b6a4ff710beb998e42380afe069eaaf4330ade2bed99b8217ba2835b85aa07ec33
-
SSDEEP
196608:zhorEAXdQmRrdA6lsuErSEEJwrOoF6OrtYPXk0q:tOEAdQOls+9JoOyrt8q
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2088 a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe 2088 a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe 2088 a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2088 4440 a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe 83 PID 4440 wrote to memory of 2088 4440 a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"2⤵
- Loads dropped DLL
PID:2088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
1.7MB
MD5c6b150f2eca4eec01765bdae9a78e097
SHA11eaf2a18863af05d4f8183978ea6ecadd21ed3de
SHA256b8e074772e3f8203de0e4313ac274de4d4e5b5e847a3fe3dc4171413ea2a4502
SHA512697cdcd1f23cf67683836cca593df643f3f2d3f139fdbf86bf990bd7c29a6721d8199fbff491cb234d2fb65bcd4f32f07796b8b522b895a52095d17628beb846
-
Filesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
Filesize
1020KB
MD5c9c70e684ca8e1d74fcfa17dbc6eaab4
SHA1956f47dbed9b405687429827f532e5347189f108
SHA256c3c6ff3005623a771cf1642beabb62add5f101782b8f2b60081ab3faf2824cca
SHA5122b3e9f1fe105bd4c08e76e6ac584670735cc459272c34e95dce3db3f58ad392a1a63c2726f3f08e1d35fd6facab92d41b9cb2ac44c0531ce44daf17a9517374a