Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
9e1d9449d92d69c51a605225410f46f9
-
SHA1
f6e4d110f48bb4264097dd3101ef791f2c3d01b0
-
SHA256
c5e71ca1dcfe7975449a25d339036f3720b0b72aa52d8794b024442216487a4d
-
SHA512
000904eeacc9cc086a9f666dc8cca356e4d1a0ec0fc79dd9032c1b37399a8d75585d4a9b874ca161a38675afe69fceb817482afba75f0e09fc11169fdf16227c
-
SSDEEP
24576:N8tYzPKod2UyOtEIh85b6vBIFPocvBlcjPPdoCmNIqS2IR0QQPyMzMZB84D:N8tOPKjp017vBIRvBluPdoCmNM2y08CU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1720 set thread context of 2060 1720 tmp.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tmp.execmd.exepid process 1720 tmp.exe 1720 tmp.exe 2060 cmd.exe 2060 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
tmp.execmd.exepid process 1720 tmp.exe 2060 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
tmp.execmd.exedescription pid process target process PID 1720 wrote to memory of 2060 1720 tmp.exe cmd.exe PID 1720 wrote to memory of 2060 1720 tmp.exe cmd.exe PID 1720 wrote to memory of 2060 1720 tmp.exe cmd.exe PID 1720 wrote to memory of 2060 1720 tmp.exe cmd.exe PID 1720 wrote to memory of 2060 1720 tmp.exe cmd.exe PID 2060 wrote to memory of 2832 2060 cmd.exe tmp.exe PID 2060 wrote to memory of 2832 2060 cmd.exe tmp.exe PID 2060 wrote to memory of 2832 2060 cmd.exe tmp.exe PID 2060 wrote to memory of 2832 2060 cmd.exe tmp.exe PID 2060 wrote to memory of 2832 2060 cmd.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe3⤵PID:2832
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1004KB
MD52e999a593bc636ed2d10691f4f913926
SHA103cedc72a2a49b9a6b62768f72fe838cfb521fee
SHA2566d624d9a139dd7d2a09ae186d66201cc1a90f83ff7a59ff49d1d950b043fb51d
SHA51254c36b2d234f7664cc3e3ce380453026606e13e06b43dbc4d72f19c7abf8f9a3cea9a7b8ea75a728a149f6853d1fa5b5e1e492b16d403c77a6336b458e43e81b