Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 05:09
Static task
static1
Behavioral task
behavioral1
Sample
9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe
Resource
win10v2004-20230915-en
General
-
Target
9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe
-
Size
5KB
-
MD5
aaf4496f8347a21a513535450d84ce18
-
SHA1
f18c68d4582d17bc1c6a8a0a931d6340b732d30d
-
SHA256
9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429
-
SHA512
e59c8512918f9f3b6f42b79d7e3dc0066592c5240dbf7f848e3bb4fbb152772aaaa5c2cc83750d19589a8c8c3237716e88c682dadce0a63dc968767a9391ce39
-
SSDEEP
96:89tHlXIDqHP/gKm0VleLu1AOyddoTrQDzBJSJ0orSm:olXjnHmiWuaOgIaorF
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4548 20231007T050922_892.exe 4660 20231007T051005_704.exe 912 20231007T051045_111.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1600 wrote to memory of 64 1600 9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe 99 PID 1600 wrote to memory of 64 1600 9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe 99 PID 64 wrote to memory of 4548 64 cmd.exe 100 PID 64 wrote to memory of 4548 64 cmd.exe 100 PID 4548 wrote to memory of 5024 4548 20231007T050922_892.exe 102 PID 4548 wrote to memory of 5024 4548 20231007T050922_892.exe 102 PID 5024 wrote to memory of 4660 5024 cmd.exe 103 PID 5024 wrote to memory of 4660 5024 cmd.exe 103 PID 4660 wrote to memory of 2468 4660 20231007T051005_704.exe 111 PID 4660 wrote to memory of 2468 4660 20231007T051005_704.exe 111 PID 2468 wrote to memory of 912 2468 cmd.exe 112 PID 2468 wrote to memory of 912 2468 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe"C:\Users\Admin\AppData\Local\Temp\9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe2⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exeC:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exeC:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe6⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exeC:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe7⤵
- Executes dropped EXE
PID:912
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD549ccfaf492138c0e18c51958b0b6fb32
SHA14613a67cd96038e4a572bc233a5fa854d549f0d0
SHA256bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402
SHA512f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861
-
Filesize
5KB
MD549ccfaf492138c0e18c51958b0b6fb32
SHA14613a67cd96038e4a572bc233a5fa854d549f0d0
SHA256bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402
SHA512f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861
-
Filesize
5KB
MD549ccfaf492138c0e18c51958b0b6fb32
SHA14613a67cd96038e4a572bc233a5fa854d549f0d0
SHA256bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402
SHA512f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861
-
Filesize
5KB
MD5297b76a4d354604a235993bb3a84a856
SHA17dec0656ba5dc917b4c08145b29199a5f424a38b
SHA256a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05
SHA512ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59
-
Filesize
5KB
MD5297b76a4d354604a235993bb3a84a856
SHA17dec0656ba5dc917b4c08145b29199a5f424a38b
SHA256a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05
SHA512ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59
-
Filesize
5KB
MD5297b76a4d354604a235993bb3a84a856
SHA17dec0656ba5dc917b4c08145b29199a5f424a38b
SHA256a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05
SHA512ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59
-
Filesize
5KB
MD5558c52d68576eb936f700cc67d975398
SHA1cf7c8697d553469e7c4801ca4d50835ceddeadde
SHA256121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb
SHA512fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f
-
Filesize
5KB
MD5558c52d68576eb936f700cc67d975398
SHA1cf7c8697d553469e7c4801ca4d50835ceddeadde
SHA256121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb
SHA512fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f
-
Filesize
5KB
MD5558c52d68576eb936f700cc67d975398
SHA1cf7c8697d553469e7c4801ca4d50835ceddeadde
SHA256121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb
SHA512fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f