Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
438404e918c05eff548c55fe1c84de9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
438404e918c05eff548c55fe1c84de9e.exe
Resource
win10v2004-20231222-en
General
-
Target
438404e918c05eff548c55fe1c84de9e.exe
-
Size
1.8MB
-
MD5
438404e918c05eff548c55fe1c84de9e
-
SHA1
1f7b5c11a8f96bacfff53c1354352bf935174baf
-
SHA256
4cf9e97cd8f69a04fc15a5972ac5ed3750f5805a971d4d8609219146753f757c
-
SHA512
2b9b7d86f68ad88d6414001dccf3f3c70af7b1058f3e2c9639a3369829378535418f526e2755d6ef1ee865d486f92f22f7ec951f31d0ceb506cedf53f1e4efcc
-
SSDEEP
24576:dgdhhQGGnnazLpj4VHogiuGYNycAavew3mwmI1nk30sKbcGOyRW9ZKGDfHHELmmo:dqgazxcGYN139lnk30roDfE9tyAy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3056 cusjksrvbmll.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 438404e918c05eff548c55fe1c84de9e.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\qq\cusjksrvbmll.exe 438404e918c05eff548c55fe1c84de9e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3056 3012 438404e918c05eff548c55fe1c84de9e.exe 16 PID 3012 wrote to memory of 3056 3012 438404e918c05eff548c55fe1c84de9e.exe 16 PID 3012 wrote to memory of 3056 3012 438404e918c05eff548c55fe1c84de9e.exe 16 PID 3012 wrote to memory of 3056 3012 438404e918c05eff548c55fe1c84de9e.exe 16
Processes
-
C:\Program Files (x86)\qq\cusjksrvbmll.exe"C:\Program Files (x86)\qq\cusjksrvbmll.exe"1⤵
- Executes dropped EXE
PID:3056
-
C:\Users\Admin\AppData\Local\Temp\438404e918c05eff548c55fe1c84de9e.exe"C:\Users\Admin\AppData\Local\Temp\438404e918c05eff548c55fe1c84de9e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3012
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5f4a548c73bd2551571179e4a20528db1
SHA14543ad85b64cf96f53480854ff92bf242f344c0d
SHA256d6f0ca1e1f1e6b24be20c6dea13f6ba11dc3bd7d02d03fe445875e004d95326c
SHA51288d603574854f2bd4433a59fd9bae5e1725e616ef18ec04043084f0b32931173202552c02ff19f5dbe5a8aa0ba3dc91ef5a0f0259ed876f312fe71716056d7df
-
Filesize
1.1MB
MD559f222ae79ada0d085dc13bc12fa4c91
SHA1a0ad7e4a8ee149395c340ac4ad23cdc9fee71595
SHA256c0921bdbf5a04c44c95dabd796f7563519c34c4f704c430e464e7e3f2a87f95c
SHA512be241720e9d4fc511fbe19429b540351bb6fc5b767e1ce98d24328379f0d7937e229a7f8035dd4dc9b1177a1f438556248381202339853baf7495d2076325b2f