Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
08e09088834d2449dea46194044e4779.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08e09088834d2449dea46194044e4779.exe
Resource
win10v2004-20231222-en
General
-
Target
08e09088834d2449dea46194044e4779.exe
-
Size
183KB
-
MD5
08e09088834d2449dea46194044e4779
-
SHA1
e69c9177b79848695cfc72db22cc4c6a50400b87
-
SHA256
26d580f1f1a7e6d677f34dddbacff3576faa91e6089e7382f7285a5b2e4aa85b
-
SHA512
f89daf51b2ac5488bf2f96f5aee3f029a0a79cd131fdc20db3d98404ca030bb7d117bbcc1e622e2632481666b62a1fbad4f94aa811138d6ce93f5d789778dd76
-
SSDEEP
3072:duo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfMssfmN/k7t:d5oaqJhJMHW69B9VjMdxPedN9ug0/9TC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1380 1640 08e09088834d2449dea46194044e4779.exe 29 PID 1640 wrote to memory of 1380 1640 08e09088834d2449dea46194044e4779.exe 29 PID 1640 wrote to memory of 1380 1640 08e09088834d2449dea46194044e4779.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e09088834d2449dea46194044e4779.exe"C:\Users\Admin\AppData\Local\Temp\08e09088834d2449dea46194044e4779.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9D29.tmp\9D3A.tmp\9D3B.bat C:\Users\Admin\AppData\Local\Temp\08e09088834d2449dea46194044e4779.exe"2⤵PID:1380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD545c09bc5a97fb86577a7ac35af49f467
SHA1fc7c971e77c0dceced30919960b378975b010c2a
SHA256e189145e2c991de845f8c1110f830b6322ee3d1c08a8a50406229938d167ede2
SHA512b7b733987f7bba96d6afc8c7f98f3ab93983f18263b45035791cd61b67f7179141374e18c2a402c2dc3157e77963b29b2b21206e8ca752f59292cbc1b228c3b8