Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe
Resource
win10v2004-20240226-en
General
-
Target
63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe
-
Size
79KB
-
MD5
02c9bfbb123479221cc23b63c469dc7a
-
SHA1
ee32131ea0c1f8393448ae059741fa9981c55330
-
SHA256
63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575
-
SHA512
d64857db3b7bab256b6386eaacc0f47128e1166aeeca1e26c790525337645f301a48ffdfb2f46d684f907694262570aa1e228786311710de33487e55f0643914
-
SSDEEP
1536:zvdtbD/STEiCoOQA8AkqUhMb2nuy5wgIP0CSJ+5ypB8GMGlZ5G:zvdtPS7CtGdqU7uy5w9WMypN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1852 cmd.exe 1852 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1852 2156 63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe 29 PID 2156 wrote to memory of 1852 2156 63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe 29 PID 2156 wrote to memory of 1852 2156 63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe 29 PID 2156 wrote to memory of 1852 2156 63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe 29 PID 1852 wrote to memory of 2284 1852 cmd.exe 30 PID 1852 wrote to memory of 2284 1852 cmd.exe 30 PID 1852 wrote to memory of 2284 1852 cmd.exe 30 PID 1852 wrote to memory of 2284 1852 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe"C:\Users\Admin\AppData\Local\Temp\63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2284
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD57699197868b76aa59bb61b141b7a46ea
SHA1685176bc5e87cbdad544b6658bcd862ed307e153
SHA256193112b7e2c1f522b0c41dc1ec8c82ff168d32a717e82ab2be9c12f6bd04fa23
SHA5124206f5bb2047bfbbe649a2e10ab11176b682a87b46e3de3d4fdfb8487e62c10a70179dee1bbfc6305ab9e762fa8df1fe6025f6223eebcd72e15ff1e901b31740