Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe
Resource
win10v2004-20230915-en
General
-
Target
ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe
-
Size
5KB
-
MD5
1ffec3a89c49bebcef21a5334f126ecf
-
SHA1
0a9f151feec42a8a63d63f75b6b6d26fd53f9cc4
-
SHA256
ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f
-
SHA512
c28e4eb39b020555eab5a1bdc26163e08156a78d5105991f036ac0a15dd6d875808b020d533c928367cdf3afa50d165700bd865712d68b9609ead52ec4b004e0
-
SSDEEP
96:VvtHdXgTvetmwQdwrOD7TrBxzBIaorDPPp:fdXKetmIrODBIaorDPPp
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2764 20231011T090550_704.exe 3008 20231011T090614_899.exe 1740 20231011T090636_474.exe 312 20231011T090705_209.exe 1988 20231011T090723_430.exe 2384 20231011T090737_782.exe -
Loads dropped DLL 12 IoCs
pid Process 2612 cmd.exe 2612 cmd.exe 2524 cmd.exe 2524 cmd.exe 532 cmd.exe 532 cmd.exe 864 cmd.exe 864 cmd.exe 1348 cmd.exe 1348 cmd.exe 1324 cmd.exe 1324 cmd.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2612 2200 ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe 31 PID 2200 wrote to memory of 2612 2200 ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe 31 PID 2200 wrote to memory of 2612 2200 ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe 31 PID 2612 wrote to memory of 2764 2612 cmd.exe 32 PID 2612 wrote to memory of 2764 2612 cmd.exe 32 PID 2612 wrote to memory of 2764 2612 cmd.exe 32 PID 2764 wrote to memory of 2524 2764 20231011T090550_704.exe 36 PID 2764 wrote to memory of 2524 2764 20231011T090550_704.exe 36 PID 2764 wrote to memory of 2524 2764 20231011T090550_704.exe 36 PID 2524 wrote to memory of 3008 2524 cmd.exe 37 PID 2524 wrote to memory of 3008 2524 cmd.exe 37 PID 2524 wrote to memory of 3008 2524 cmd.exe 37 PID 3008 wrote to memory of 532 3008 20231011T090614_899.exe 39 PID 3008 wrote to memory of 532 3008 20231011T090614_899.exe 39 PID 3008 wrote to memory of 532 3008 20231011T090614_899.exe 39 PID 532 wrote to memory of 1740 532 cmd.exe 40 PID 532 wrote to memory of 1740 532 cmd.exe 40 PID 532 wrote to memory of 1740 532 cmd.exe 40 PID 1740 wrote to memory of 864 1740 20231011T090636_474.exe 42 PID 1740 wrote to memory of 864 1740 20231011T090636_474.exe 42 PID 1740 wrote to memory of 864 1740 20231011T090636_474.exe 42 PID 864 wrote to memory of 312 864 cmd.exe 43 PID 864 wrote to memory of 312 864 cmd.exe 43 PID 864 wrote to memory of 312 864 cmd.exe 43 PID 312 wrote to memory of 1348 312 20231011T090705_209.exe 45 PID 312 wrote to memory of 1348 312 20231011T090705_209.exe 45 PID 312 wrote to memory of 1348 312 20231011T090705_209.exe 45 PID 1348 wrote to memory of 1988 1348 cmd.exe 46 PID 1348 wrote to memory of 1988 1348 cmd.exe 46 PID 1348 wrote to memory of 1988 1348 cmd.exe 46 PID 1988 wrote to memory of 1324 1988 20231011T090723_430.exe 48 PID 1988 wrote to memory of 1324 1988 20231011T090723_430.exe 48 PID 1988 wrote to memory of 1324 1988 20231011T090723_430.exe 48 PID 1324 wrote to memory of 2384 1324 cmd.exe 49 PID 1324 wrote to memory of 2384 1324 cmd.exe 49 PID 1324 wrote to memory of 2384 1324 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe"C:\Users\Admin\AppData\Local\Temp\ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exeC:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exeC:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exeC:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exeC:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe10⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exeC:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exeC:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe13⤵
- Executes dropped EXE
PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52e412d7565cfa3515ff03b433620c97c
SHA1fbffcee7f5bc7abc556d18c978e1d4167b13d7cd
SHA256a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9
SHA51237622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d
-
Filesize
5KB
MD52e412d7565cfa3515ff03b433620c97c
SHA1fbffcee7f5bc7abc556d18c978e1d4167b13d7cd
SHA256a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9
SHA51237622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d
-
Filesize
5KB
MD55188fa69e91d1e717d72a6c3a621590f
SHA1aef90608c209fde97d20c5b2d64a64b1c296edbe
SHA2565c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068
SHA51249f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80
-
Filesize
5KB
MD55188fa69e91d1e717d72a6c3a621590f
SHA1aef90608c209fde97d20c5b2d64a64b1c296edbe
SHA2565c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068
SHA51249f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80
-
Filesize
5KB
MD580ec6e60179476ab9a7ae19c744537ae
SHA18269e026cfe9e702cb8ff54c3f46fcecb38633e6
SHA25645eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8
SHA512aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0
-
Filesize
5KB
MD580ec6e60179476ab9a7ae19c744537ae
SHA18269e026cfe9e702cb8ff54c3f46fcecb38633e6
SHA25645eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8
SHA512aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0
-
Filesize
5KB
MD5fb54624bff5e356c73dd794fdb7fea6d
SHA15769b1c8aa67db16a10573d30ad8f78066e442aa
SHA2568550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a
SHA512b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a
-
Filesize
5KB
MD5fb54624bff5e356c73dd794fdb7fea6d
SHA15769b1c8aa67db16a10573d30ad8f78066e442aa
SHA2568550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a
SHA512b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a
-
Filesize
5KB
MD56222a4e2a88ae5d21999f6bff96fcc2b
SHA148ba482f14ed1a7652bb2ec9f6bca3a323f81738
SHA256168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8
SHA5128614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8
-
Filesize
5KB
MD56222a4e2a88ae5d21999f6bff96fcc2b
SHA148ba482f14ed1a7652bb2ec9f6bca3a323f81738
SHA256168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8
SHA5128614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8
-
Filesize
5KB
MD5d011a2ece4ff67c6fedff7c9655acdba
SHA1ec8f6bcde6461821437d9d1658343f0c17aa1f0f
SHA2565f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd
SHA51215a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265
-
Filesize
5KB
MD5d011a2ece4ff67c6fedff7c9655acdba
SHA1ec8f6bcde6461821437d9d1658343f0c17aa1f0f
SHA2565f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd
SHA51215a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265
-
Filesize
5KB
MD52e412d7565cfa3515ff03b433620c97c
SHA1fbffcee7f5bc7abc556d18c978e1d4167b13d7cd
SHA256a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9
SHA51237622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d
-
Filesize
5KB
MD52e412d7565cfa3515ff03b433620c97c
SHA1fbffcee7f5bc7abc556d18c978e1d4167b13d7cd
SHA256a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9
SHA51237622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d
-
Filesize
5KB
MD55188fa69e91d1e717d72a6c3a621590f
SHA1aef90608c209fde97d20c5b2d64a64b1c296edbe
SHA2565c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068
SHA51249f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80
-
Filesize
5KB
MD55188fa69e91d1e717d72a6c3a621590f
SHA1aef90608c209fde97d20c5b2d64a64b1c296edbe
SHA2565c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068
SHA51249f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80
-
Filesize
5KB
MD580ec6e60179476ab9a7ae19c744537ae
SHA18269e026cfe9e702cb8ff54c3f46fcecb38633e6
SHA25645eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8
SHA512aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0
-
Filesize
5KB
MD580ec6e60179476ab9a7ae19c744537ae
SHA18269e026cfe9e702cb8ff54c3f46fcecb38633e6
SHA25645eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8
SHA512aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0
-
Filesize
5KB
MD5fb54624bff5e356c73dd794fdb7fea6d
SHA15769b1c8aa67db16a10573d30ad8f78066e442aa
SHA2568550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a
SHA512b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a
-
Filesize
5KB
MD5fb54624bff5e356c73dd794fdb7fea6d
SHA15769b1c8aa67db16a10573d30ad8f78066e442aa
SHA2568550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a
SHA512b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a
-
Filesize
5KB
MD56222a4e2a88ae5d21999f6bff96fcc2b
SHA148ba482f14ed1a7652bb2ec9f6bca3a323f81738
SHA256168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8
SHA5128614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8
-
Filesize
5KB
MD56222a4e2a88ae5d21999f6bff96fcc2b
SHA148ba482f14ed1a7652bb2ec9f6bca3a323f81738
SHA256168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8
SHA5128614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8
-
Filesize
5KB
MD5d011a2ece4ff67c6fedff7c9655acdba
SHA1ec8f6bcde6461821437d9d1658343f0c17aa1f0f
SHA2565f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd
SHA51215a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265
-
Filesize
5KB
MD5d011a2ece4ff67c6fedff7c9655acdba
SHA1ec8f6bcde6461821437d9d1658343f0c17aa1f0f
SHA2565f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd
SHA51215a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265