Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
4c6deb78eb41857d7dd5e66c492c9bcc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c6deb78eb41857d7dd5e66c492c9bcc.exe
Resource
win10v2004-20231215-en
General
-
Target
4c6deb78eb41857d7dd5e66c492c9bcc.exe
-
Size
61KB
-
MD5
4c6deb78eb41857d7dd5e66c492c9bcc
-
SHA1
5bbaaa083508dcfe28d7d29b40f6f7f1099d8f4d
-
SHA256
43aeff7c857d73bdf7391fe0ad3ff2b80004a941330c4abdabb0681a6bf8d568
-
SHA512
33f3ceb1e02faf16904febf3187cf5e4165b665d351a17278ba24a832e8f4eb60346531c38133506522f46f8347bd3ba7715ab97c99e3d4df8894f2021d8c0aa
-
SSDEEP
768:vCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWNReOO9:71Tzy48untU8fOMEI3jyYfPiuO9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2176 2792 4c6deb78eb41857d7dd5e66c492c9bcc.exe 16 PID 2792 wrote to memory of 2176 2792 4c6deb78eb41857d7dd5e66c492c9bcc.exe 16 PID 2792 wrote to memory of 2176 2792 4c6deb78eb41857d7dd5e66c492c9bcc.exe 16 PID 2792 wrote to memory of 2176 2792 4c6deb78eb41857d7dd5e66c492c9bcc.exe 16 PID 2176 wrote to memory of 2860 2176 cmd.exe 19 PID 2176 wrote to memory of 2860 2176 cmd.exe 19 PID 2176 wrote to memory of 2860 2176 cmd.exe 19 PID 2176 wrote to memory of 2860 2176 cmd.exe 19 PID 2860 wrote to memory of 2876 2860 iexpress.exe 17 PID 2860 wrote to memory of 2876 2860 iexpress.exe 17 PID 2860 wrote to memory of 2876 2860 iexpress.exe 17 PID 2860 wrote to memory of 2876 2860 iexpress.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c6deb78eb41857d7dd5e66c492c9bcc.exe"C:\Users\Admin\AppData\Local\Temp\4c6deb78eb41857d7dd5e66c492c9bcc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\889.tmp\1.bat" "C:\Users\Admin\AppData\Local\Temp\4c6deb78eb41857d7dd5e66c492c9bcc.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\iexpress.exeiexpress /n /q /m C:\Users\Admin\AppData\Local\Temp\popup.sed3⤵
- Suspicious use of WriteProcessMemory
PID:2860
-
-
-
C:\Windows\SysWOW64\makecab.exeC:\Windows\SysWOW64\makecab.exe /f "~%TargetName%.DDF"1⤵PID:2876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD502dba5f37067292355c6d01a57d4ef48
SHA17c67ab3f99fbf7a53018dd295d2968c525db83d9
SHA2568b74c812ba9e6c536da7edd4101e7e0dddeab8355e5aff095dd31b3f00560242
SHA51212201f949ee3198c8f4b39cc8edf90a114ecf42ddd5383ed0b87e4c78053cd517786dc7af83557e63a0483af74f4c0117d5568441ae761ff6958e758704d602a
-
Filesize
61KB
MD5d243b383c6948856d0d123ae81554969
SHA15b720be78b34823abee0468761d6727804f7ab70
SHA256ebf4c0a6aff0af89f28149f57209efb07f0b475a2bfaba8332ccb0f9351dcbf6
SHA512517a256656f954ff0181cfacf85d0356b9505c68253b0ebcf6ef3de01b96e0b2cfcbfc4ecc3f5ecc6e2f4d8a6bc7c9aca8ec27c8be35476264c4f345256233ba
-
Filesize
724B
MD5c3ca008abd6997c4b036a7e8be75cb2c
SHA105f7a3527bb04c691b08f040f562582035398829
SHA25629ef6bf47dcc8c67f1abe1b269d3518d6a4ebe125daa1ea460779638cb9782a3
SHA512bee0baf3cb83144239077f99f5ca2a6ca7b618f7f51a53e03613ae697e8bc76fa28f5d006296b469be8e1fffeeb35668b5fe87b260b1380cc003815ea9efb083