Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
8f790262407e8e582448337c47ba79cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f790262407e8e582448337c47ba79cc.exe
Resource
win10v2004-20231215-en
General
-
Target
8f790262407e8e582448337c47ba79cc.exe
-
Size
73KB
-
MD5
8f790262407e8e582448337c47ba79cc
-
SHA1
88eaa893a99045feb7d50e421ffa085a4c977fe6
-
SHA256
47ca2bc6d301920e8a36bca3cc17b74a2c52c0ccac3703c8a543b50ffac5aaa3
-
SHA512
a67ff99cab350d694e241d3658d586f30ac21cf7ed6714d95156f5fd1f905b8de7a37bf425ad3eff3f1ce5009dbfc63b62d746bfafad4e08ee76d57dd7a23767
-
SSDEEP
1536:HbH1xeUhdK5QPqfhVWbdsmA+RjPFLC+e5h+0ZGUGf2g:HreUhdNPqfcxA+HFsh+Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2296 cmd.exe 2296 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2296 2672 8f790262407e8e582448337c47ba79cc.exe 29 PID 2672 wrote to memory of 2296 2672 8f790262407e8e582448337c47ba79cc.exe 29 PID 2672 wrote to memory of 2296 2672 8f790262407e8e582448337c47ba79cc.exe 29 PID 2672 wrote to memory of 2296 2672 8f790262407e8e582448337c47ba79cc.exe 29 PID 2296 wrote to memory of 2680 2296 cmd.exe 30 PID 2296 wrote to memory of 2680 2296 cmd.exe 30 PID 2296 wrote to memory of 2680 2296 cmd.exe 30 PID 2296 wrote to memory of 2680 2296 cmd.exe 30 PID 2680 wrote to memory of 2692 2680 [email protected] 31 PID 2680 wrote to memory of 2692 2680 [email protected] 31 PID 2680 wrote to memory of 2692 2680 [email protected] 31 PID 2680 wrote to memory of 2692 2680 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f790262407e8e582448337c47ba79cc.exe"C:\Users\Admin\AppData\Local\Temp\8f790262407e8e582448337c47ba79cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2692
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD57e43dc940da8bb69505fe0c857f173c3
SHA17e6f7e4504e1a56c1ae171d12040724d0ddba31b
SHA256f1d7f6f81476a6dc2f80818e68ebbf32ec43fea9174ff90bb2051ecf159d9b5f
SHA512f42aacbde35ebc1296c6e55a00b51adb8ae260ed1f824a868899f33ce08dc7d4d21a13537a3826fbb3fa09cc0c7b6cc31f13abf385724c95cb53bc183c2e44ed