Analysis

  • max time kernel
    470s
  • max time network
    459s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 18:27

General

  • Target

    beacon_x64.exe

  • Size

    321KB

  • MD5

    c27f56b0de8b01665662e3a1b22aa582

  • SHA1

    44950fe971cfea5e5613ff1787082e353e3e38eb

  • SHA256

    1b8e19d90f8fccfbf6c7448315085464150553e0f901a5b816ace97b2b9b53ab

  • SHA512

    be0c63d709a446d6cb2d05699da9fec004a0a3d0a748268191da57bce85dd03f677a12d0bfdf7bd1f0d229cda875fbc7f4a8bfaede22fbd2ee581d51baa7ab5c

  • SSDEEP

    6144:CR25Bc7SRe7ZZ/o9Uu8iiK3X8JGjToWyRFZVrM8LyNsAGqmh6+X+sTJJUqYUJn:9BfCeX8eeRFZVVyQhXt12

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beacon_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\beacon_x64.exe"
    1⤵
      PID:3120
    • \??\UNC\127.0.0.1\ADMIN$\74b752c.exe
      \\127.0.0.1\ADMIN$\74b752c.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3344
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe
        2⤵
        • Blocklisted process makes network request
        • Modifies data under HKEY_USERS
        PID:2288

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2288-48-0x00000206DF190000-0x00000206DF1DC000-memory.dmp

      Filesize

      304KB

    • memory/2288-51-0x00000206DF450000-0x00000206DF4A8000-memory.dmp

      Filesize

      352KB

    • memory/2288-54-0x00000206DF450000-0x00000206DF4A8000-memory.dmp

      Filesize

      352KB

    • memory/3120-0-0x0000000000780000-0x00000000007CB000-memory.dmp

      Filesize

      300KB

    • memory/3120-1-0x00000000007D0000-0x0000000000828000-memory.dmp

      Filesize

      352KB

    • memory/3120-4-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/3120-5-0x00000000007D0000-0x0000000000828000-memory.dmp

      Filesize

      352KB

    • memory/3120-45-0x0000000002D40000-0x0000000002D42000-memory.dmp

      Filesize

      8KB

    • memory/3120-53-0x0000000002D40000-0x0000000002D42000-memory.dmp

      Filesize

      8KB

    • memory/3344-50-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB