Analysis
-
max time kernel
15s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 02:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45106c8df86fdee9481419c08b232953.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
45106c8df86fdee9481419c08b232953.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
45106c8df86fdee9481419c08b232953.exe
-
Size
307KB
-
MD5
45106c8df86fdee9481419c08b232953
-
SHA1
aff03fcb79ded52be0385a757ac8b466df703f43
-
SHA256
db408065484a69e93e936d238b0c209d7ed775f8b3dbf57a56107656ee9171d4
-
SHA512
a60dccd43fe86fc7534167a0b31a5bc6b5640d640833e1efbd8b786b38ee0001bec53f42a1d3461f31c9471026bcf589e1257c1e1fbdea718fa16a8f89bf4559
-
SSDEEP
6144:nQgmxJvI9dx8CW3e0dZfFgCZTdsmnElqLNTgK/WlkFGmN4L:nQJvR1dTdxGmnOaD/yAA
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2344 CLI.exe 2888 CLI.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\CLI.exe CLI.exe File created C:\Windows\SysWOW64\CLI.exe CLI.exe File created C:\Windows\SysWOW64\CLI.exe 45106c8df86fdee9481419c08b232953.exe File opened for modification C:\Windows\SysWOW64\CLI.exe 45106c8df86fdee9481419c08b232953.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3800 wrote to memory of 2344 3800 45106c8df86fdee9481419c08b232953.exe 19 PID 3800 wrote to memory of 2344 3800 45106c8df86fdee9481419c08b232953.exe 19 PID 3800 wrote to memory of 2344 3800 45106c8df86fdee9481419c08b232953.exe 19 PID 2344 wrote to memory of 2888 2344 CLI.exe 99 PID 2344 wrote to memory of 2888 2344 CLI.exe 99 PID 2344 wrote to memory of 2888 2344 CLI.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\45106c8df86fdee9481419c08b232953.exe"C:\Users\Admin\AppData\Local\Temp\45106c8df86fdee9481419c08b232953.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1180 "C:\Users\Admin\AppData\Local\Temp\45106c8df86fdee9481419c08b232953.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1188 "C:\Windows\SysWOW64\CLI.exe"3⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1156 "C:\Windows\SysWOW64\CLI.exe"4⤵PID:3940
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1160 "C:\Windows\SysWOW64\CLI.exe"5⤵PID:2508
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1164 "C:\Windows\SysWOW64\CLI.exe"6⤵PID:4284
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1168 "C:\Windows\SysWOW64\CLI.exe"7⤵PID:1192
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1176 "C:\Windows\SysWOW64\CLI.exe"8⤵PID:220
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1184 "C:\Windows\SysWOW64\CLI.exe"9⤵PID:1800
-
C:\Windows\SysWOW64\CLI.exeC:\Windows\system32\CLI.exe 1192 "C:\Windows\SysWOW64\CLI.exe"10⤵PID:1968
-
-
-
-
-
-
-
-
-