Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
SHAREit-KCWEB.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SHAREit-KCWEB.exe
Resource
win10v2004-20240221-en
General
-
Target
SHAREit-KCWEB.exe
-
Size
22.7MB
-
MD5
6ff54967682b9c6423dd788021a73e4f
-
SHA1
a18fa46411f0a2e30568227b9c6e119242c5b41b
-
SHA256
6741a52af4b543a0134b3bb9cfb4e3fc095ca3a6b6f2b287583f66b102cb222e
-
SHA512
8309f3d5612ef8e60db5420f7fbde1657ff0e19a2b4c60b44a9263b31309854fa49f65620a903ee94123e3414eb4f71b70b8ed4d98cd9c5ccefbc67100d9ae15
-
SSDEEP
393216:5UGGB9sWPDueM3n9VE5wmBAbHyGmNXPDWGglDnDInozKqA5hhNAa:aXB9scDP09K5wmBAbyGmlKlb25Aa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 SHAREit-KCWEB.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1268 1988 SHAREit-KCWEB.exe 82 PID 1988 wrote to memory of 1268 1988 SHAREit-KCWEB.exe 82 PID 1988 wrote to memory of 1268 1988 SHAREit-KCWEB.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHAREit-KCWEB.exe"C:\Users\Admin\AppData\Local\Temp\SHAREit-KCWEB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\is-25S7R.tmp\SHAREit-KCWEB.tmp"C:\Users\Admin\AppData\Local\Temp\is-25S7R.tmp\SHAREit-KCWEB.tmp" /SL5="$40224,22894262,1098240,C:\Users\Admin\AppData\Local\Temp\SHAREit-KCWEB.exe"2⤵
- Executes dropped EXE
PID:1268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5abc717a6edea75752cd86416b5565cf7
SHA181ed2c7d08e646118fa45eee49863c3049ccb496
SHA256a2cfb52bf5e2822f6ebadceed6233940eceed4edce3dfdb318a5fcc5313f929a
SHA5121663c5ec7fa785cc2537239562fcf709fa79e903925fa723ee6d457f3e8d51a900ae21ca465ed2d79c97f66a3e64930b6a7f4b5687a116a9f313b798f2770633