Analysis
-
max time kernel
152s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
24cb857e7a98eb2852a887f9a5d957ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24cb857e7a98eb2852a887f9a5d957ea.exe
Resource
win10v2004-20231222-en
General
-
Target
24cb857e7a98eb2852a887f9a5d957ea.exe
-
Size
68KB
-
MD5
24cb857e7a98eb2852a887f9a5d957ea
-
SHA1
116510bc7b499001f36082e194a07c22ec1bccff
-
SHA256
3984c2b53442e692f4c12e8e79d7a9890730a1b4066607517403ac5cdae9d811
-
SHA512
73828583015afe1a03631b289fec47ff559a5360202b017210562704fa8e76e0895261984ace3418c2854453625351845c8243a048b166423ed4c0f6b52678d9
-
SSDEEP
1536:CVlRTWxTeJNaVKZ4M06wQJ7W1ReTiPh4kuZ:IlRTWxTeJNgKZ4a7EYq4VZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1644 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 cnwryxaf.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 2848 24cb857e7a98eb2852a887f9a5d957ea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2848 24cb857e7a98eb2852a887f9a5d957ea.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1464 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 33 PID 2848 wrote to memory of 1464 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 33 PID 2848 wrote to memory of 1464 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 33 PID 2848 wrote to memory of 1464 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 33 PID 2848 wrote to memory of 1644 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 31 PID 2848 wrote to memory of 1644 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 31 PID 2848 wrote to memory of 1644 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 31 PID 2848 wrote to memory of 1644 2848 24cb857e7a98eb2852a887f9a5d957ea.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\24cb857e7a98eb2852a887f9a5d957ea.exe"C:\Users\Admin\AppData\Local\Temp\24cb857e7a98eb2852a887f9a5d957ea.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\24CB85~1.EXE.bak >> NUL2⤵
- Deletes itself
PID:1644
-
-
C:\ProgramData\mvoneriz\cnwryxaf.exeC:\ProgramData\mvoneriz\cnwryxaf.exe2⤵
- Executes dropped EXE
PID:1464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD578b5f48930c091259840864ff3dcca77
SHA13ef63f6760ca645da355cb36036d96c4787c4e42
SHA256a31b6401f90e55363829e19f1128502063c502bde3ec160ba2452d143c8a30b6
SHA512ead32119389ab8f3ee075bc890c889f01943ece8f1f95821324480a573e8aa6b46c71c28c8a2f5be91a9ed389edb1284f8f6dde1bcca46b3b3c0a62ecaa39b16
-
Filesize
68KB
MD524cb857e7a98eb2852a887f9a5d957ea
SHA1116510bc7b499001f36082e194a07c22ec1bccff
SHA2563984c2b53442e692f4c12e8e79d7a9890730a1b4066607517403ac5cdae9d811
SHA51273828583015afe1a03631b289fec47ff559a5360202b017210562704fa8e76e0895261984ace3418c2854453625351845c8243a048b166423ed4c0f6b52678d9
-
Filesize
14KB
MD5091eedb0888a626b0d76a519c8a16dbc
SHA17f07e246ef4fa04092ac15f5f6865c1526085725
SHA25671ba7f47e30b450087c1dcf5fe7fa68c725e1085e10c82b6dcc16021393cd01b
SHA5120480adadb2d2430696fa2e0438b0e5bf788400189c5b3b0cb5d5bf3d73bf8480c7a0f52724757313c94b24b8c2113dbbc3c318d7f1842e970a6755f3361255a2