Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe
Resource
win10v2004-20230915-en
General
-
Target
f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe
-
Size
5KB
-
MD5
45485e850a0a22a83861016a18ac711c
-
SHA1
7e8b5266ae98b81db0d357da8ef87b0890dac181
-
SHA256
f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7
-
SHA512
6d59c5e7b42c81c437da1d4aebc7a544ca616b7dc566fe86e95e877cc9a08a419847c3585726f1c76cf13bbbfa15b4935b05a757be12e0093b83d0e21e7e8c95
-
SSDEEP
48:6TTvtHhWXpBPIl6VSu7BX5VuTzuLhAs+VONLTrg7DYLGdfdN9orw2bWz:etHAXpnVSu7p5aOmfVOJTr62yor
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2432 20231011T010124_925.exe 2944 20231011T010210_805.exe 2784 20231011T010246_045.exe 2016 20231011T010308_853.exe -
Loads dropped DLL 8 IoCs
pid Process 2508 cmd.exe 2508 cmd.exe 2940 cmd.exe 2940 cmd.exe 2800 cmd.exe 2800 cmd.exe 2024 cmd.exe 2024 cmd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2508 2208 f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe 32 PID 2208 wrote to memory of 2508 2208 f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe 32 PID 2208 wrote to memory of 2508 2208 f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe 32 PID 2508 wrote to memory of 2432 2508 cmd.exe 33 PID 2508 wrote to memory of 2432 2508 cmd.exe 33 PID 2508 wrote to memory of 2432 2508 cmd.exe 33 PID 2432 wrote to memory of 2940 2432 20231011T010124_925.exe 35 PID 2432 wrote to memory of 2940 2432 20231011T010124_925.exe 35 PID 2432 wrote to memory of 2940 2432 20231011T010124_925.exe 35 PID 2940 wrote to memory of 2944 2940 cmd.exe 36 PID 2940 wrote to memory of 2944 2940 cmd.exe 36 PID 2940 wrote to memory of 2944 2940 cmd.exe 36 PID 2944 wrote to memory of 2800 2944 20231011T010210_805.exe 38 PID 2944 wrote to memory of 2800 2944 20231011T010210_805.exe 38 PID 2944 wrote to memory of 2800 2944 20231011T010210_805.exe 38 PID 2800 wrote to memory of 2784 2800 cmd.exe 39 PID 2800 wrote to memory of 2784 2800 cmd.exe 39 PID 2800 wrote to memory of 2784 2800 cmd.exe 39 PID 2784 wrote to memory of 2024 2784 20231011T010246_045.exe 41 PID 2784 wrote to memory of 2024 2784 20231011T010246_045.exe 41 PID 2784 wrote to memory of 2024 2784 20231011T010246_045.exe 41 PID 2024 wrote to memory of 2016 2024 cmd.exe 42 PID 2024 wrote to memory of 2016 2024 cmd.exe 42 PID 2024 wrote to memory of 2016 2024 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe"C:\Users\Admin\AppData\Local\Temp\f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exeC:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exeC:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exeC:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exeC:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe9⤵
- Executes dropped EXE
PID:2016
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51ce53e0321a35ca193ee50e6ef5c45d9
SHA1d0b3b0e1e06729c5f27be349020fa5d612efe29b
SHA2567ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b
SHA512c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330
-
Filesize
5KB
MD51ce53e0321a35ca193ee50e6ef5c45d9
SHA1d0b3b0e1e06729c5f27be349020fa5d612efe29b
SHA2567ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b
SHA512c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330
-
Filesize
5KB
MD55709a4631d2b2833e24dd00e265e5403
SHA1f31d80c223ca50f62a330bd43046f71bdd27550e
SHA2563285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28
SHA512f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0
-
Filesize
5KB
MD55709a4631d2b2833e24dd00e265e5403
SHA1f31d80c223ca50f62a330bd43046f71bdd27550e
SHA2563285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28
SHA512f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0
-
Filesize
5KB
MD51eaf94d0ad821cfa75c59cf442caa0eb
SHA1c8e1c65cfb7cf53715c7cc264b165c782a7988a4
SHA256ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8
SHA5126c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3
-
Filesize
5KB
MD51eaf94d0ad821cfa75c59cf442caa0eb
SHA1c8e1c65cfb7cf53715c7cc264b165c782a7988a4
SHA256ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8
SHA5126c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3
-
Filesize
5KB
MD594c07014fa346d4ffc70690203e72e46
SHA19047945e5ade88718f8dfcbdca265e7e97ff5609
SHA2564caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8
SHA5126b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf
-
Filesize
5KB
MD594c07014fa346d4ffc70690203e72e46
SHA19047945e5ade88718f8dfcbdca265e7e97ff5609
SHA2564caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8
SHA5126b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf
-
Filesize
5KB
MD51ce53e0321a35ca193ee50e6ef5c45d9
SHA1d0b3b0e1e06729c5f27be349020fa5d612efe29b
SHA2567ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b
SHA512c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330
-
Filesize
5KB
MD51ce53e0321a35ca193ee50e6ef5c45d9
SHA1d0b3b0e1e06729c5f27be349020fa5d612efe29b
SHA2567ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b
SHA512c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330
-
Filesize
5KB
MD55709a4631d2b2833e24dd00e265e5403
SHA1f31d80c223ca50f62a330bd43046f71bdd27550e
SHA2563285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28
SHA512f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0
-
Filesize
5KB
MD55709a4631d2b2833e24dd00e265e5403
SHA1f31d80c223ca50f62a330bd43046f71bdd27550e
SHA2563285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28
SHA512f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0
-
Filesize
5KB
MD51eaf94d0ad821cfa75c59cf442caa0eb
SHA1c8e1c65cfb7cf53715c7cc264b165c782a7988a4
SHA256ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8
SHA5126c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3
-
Filesize
5KB
MD51eaf94d0ad821cfa75c59cf442caa0eb
SHA1c8e1c65cfb7cf53715c7cc264b165c782a7988a4
SHA256ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8
SHA5126c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3
-
Filesize
5KB
MD594c07014fa346d4ffc70690203e72e46
SHA19047945e5ade88718f8dfcbdca265e7e97ff5609
SHA2564caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8
SHA5126b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf
-
Filesize
5KB
MD594c07014fa346d4ffc70690203e72e46
SHA19047945e5ade88718f8dfcbdca265e7e97ff5609
SHA2564caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8
SHA5126b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf