Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
9e1d9449d92d69c51a605225410f46f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9e1d9449d92d69c51a605225410f46f9.exe
Resource
win10v2004-20231222-en
General
-
Target
9e1d9449d92d69c51a605225410f46f9.exe
-
Size
1.4MB
-
MD5
9e1d9449d92d69c51a605225410f46f9
-
SHA1
f6e4d110f48bb4264097dd3101ef791f2c3d01b0
-
SHA256
c5e71ca1dcfe7975449a25d339036f3720b0b72aa52d8794b024442216487a4d
-
SHA512
000904eeacc9cc086a9f666dc8cca356e4d1a0ec0fc79dd9032c1b37399a8d75585d4a9b874ca161a38675afe69fceb817482afba75f0e09fc11169fdf16227c
-
SSDEEP
24576:N8tYzPKod2UyOtEIh85b6vBIFPocvBlcjPPdoCmNIqS2IR0QQPyMzMZB84D:N8tOPKjp017vBIRvBluPdoCmNM2y08CU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.exedescription pid process target process PID 2292 set thread context of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exepid process 2292 9e1d9449d92d69c51a605225410f46f9.exe 2292 9e1d9449d92d69c51a605225410f46f9.exe 2580 cmd.exe 2580 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exepid process 2292 9e1d9449d92d69c51a605225410f46f9.exe 2580 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9e1d9449d92d69c51a605225410f46f9.execmd.exedescription pid process target process PID 2292 wrote to memory of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2292 wrote to memory of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2292 wrote to memory of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2292 wrote to memory of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2292 wrote to memory of 2580 2292 9e1d9449d92d69c51a605225410f46f9.exe cmd.exe PID 2580 wrote to memory of 1728 2580 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2580 wrote to memory of 1728 2580 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2580 wrote to memory of 1728 2580 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2580 wrote to memory of 1728 2580 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe PID 2580 wrote to memory of 1728 2580 cmd.exe 9e1d9449d92d69c51a605225410f46f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe"C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exeC:\Users\Admin\AppData\Local\Temp\9e1d9449d92d69c51a605225410f46f9.exe3⤵PID:1728
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1004KB
MD56a3d36c0e015765e327440836ed4bcb6
SHA1773839270d5c4d2fb1c952ed9dbfa0cfd9c5af84
SHA256dc69f6a16331ae24f8d079dc1045fe48ca2bc2c3f4e9f4a2407de657c39c47cf
SHA5121ddfc732787362581386330b80273b89280d37ebd7e4a1b7cc9feb08f56ce14605c3fa8354e44300f369b13ec87eb814445d0587894433b8150821541461a103