Analysis
-
max time kernel
1793s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
CMClient Launcher Installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CMClient Launcher Installer.exe
Resource
win10v2004-20231215-en
General
-
Target
CMClient Launcher Installer.exe
-
Size
2.2MB
-
MD5
c5229102c115b56add70e05a7de3ad88
-
SHA1
4f0b0796e710f0372d6bee77f757f048bc09d6df
-
SHA256
8e6133d444e9f33500606cd595216e37a2a8076fc96e0d289a05a16bed752c21
-
SHA512
b40b481d3d11f66ad87ae407c22e2f239fa2e95e4fb3bd27273a01aeba818608dcb3bb411159125f61cf12873c60a2bca2ec9cc671f733965d6edd7008458d2e
-
SSDEEP
49152:wBuZrEUZ3eUBtVEz3ZNoOAMDDygTm4WiEA:OkL5t0ZGO53yOmziH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 CMClient Launcher Installer.tmp -
Loads dropped DLL 1 IoCs
pid Process 1972 CMClient Launcher Installer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 CMClient Launcher Installer.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22 PID 1972 wrote to memory of 2712 1972 CMClient Launcher Installer.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\CMClient Launcher Installer.exe"C:\Users\Admin\AppData\Local\Temp\CMClient Launcher Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\is-QL43C.tmp\CMClient Launcher Installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-QL43C.tmp\CMClient Launcher Installer.tmp" /SL5="$4010A,1484180,890880,C:\Users\Admin\AppData\Local\Temp\CMClient Launcher Installer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5d998fc0608d1a861319b7d55565023eb
SHA1109d099258540178783c183433a8765258f818ac
SHA256b459ac7db8580d5b839c3e87e76f7a75c7313e29103d986ad96f7b823f57343c
SHA512e4ff2692927af871ff363eaa5912b43aee1ec949183b69ce1e275e2406d96b3112a06a24d1713e8a1d1996f9ad1bbb58699c2dd470bf5fd10ef34b3693bc6371
-
Filesize
46KB
MD54cafb7ff962b8129b2863c7179bc7f95
SHA10fd06c4008db8498e33b8dca18541dc1106686b4
SHA256c237e464d5bf380637b6e64903907865e54274562d81881c68eff6eb1587bded
SHA51271ef86c041697d2fd55f2980807ecf63364e06d171f0fb3bf7274bd61be6189ffe105f5c0ade576d305e6c3a7d2b9bb22781e2ba4e2c6ae4301f32740fdf3d09