Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
b6c412b99ec8db39a7bfd590f52f01a4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b6c412b99ec8db39a7bfd590f52f01a4.exe
Resource
win10v2004-20240226-en
General
-
Target
b6c412b99ec8db39a7bfd590f52f01a4.exe
-
Size
22KB
-
MD5
b6c412b99ec8db39a7bfd590f52f01a4
-
SHA1
9494638fe2202061d9cd65811f7ebeaea9381731
-
SHA256
53e0094356fc446e9a0b440eeefae1c21459b8fda0b472a8fc58c0b5e4e10355
-
SHA512
24e54e9a87ef605b809bcc5472b3a90f0d7245f0ce4a0ff9bf7d40cee5172347893aa5eacb40e24dfd92f39be0013a8b536e49a9ff96d4581dad7fa612f803a5
-
SSDEEP
384:IAoK0T2pAO2V3de4ORAyR//S8EjEyU/Z61meI1iCJbOlf/fHTQtug5f7XfKIf:Ht0T2Wbe9RndEIyUIe1iMOlf/fHTQP5m
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svcos.exe b6c412b99ec8db39a7bfd590f52f01a4.exe File opened for modification C:\Windows\SysWOW64\svcos.exe b6c412b99ec8db39a7bfd590f52f01a4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 280 2092 b6c412b99ec8db39a7bfd590f52f01a4.exe 30 PID 2092 wrote to memory of 280 2092 b6c412b99ec8db39a7bfd590f52f01a4.exe 30 PID 2092 wrote to memory of 280 2092 b6c412b99ec8db39a7bfd590f52f01a4.exe 30 PID 2092 wrote to memory of 280 2092 b6c412b99ec8db39a7bfd590f52f01a4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6c412b99ec8db39a7bfd590f52f01a4.exe"C:\Users\Admin\AppData\Local\Temp\b6c412b99ec8db39a7bfd590f52f01a4.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_deeteme.bat2⤵PID:280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5abdfdc9c7b36cd3ffa3efa5995fd66a2
SHA1ec855d9b153d77123ffb0ae6f08dfbcc6a4eb099
SHA2561a2854260b1e74b2b702aa5fc3d748a233d23aa29c1cef8fa50c7b602e331b4e
SHA5128142bedeeb37cc843f96999458fe7cfb5b69d2373e4fea2706b4fa0197031729d7508d7dc31afd00514f845b104c5b583f1a4e013f5b0e7e7ff31d5fb56cd7e7
-
Filesize
22KB
MD5b6c412b99ec8db39a7bfd590f52f01a4
SHA19494638fe2202061d9cd65811f7ebeaea9381731
SHA25653e0094356fc446e9a0b440eeefae1c21459b8fda0b472a8fc58c0b5e4e10355
SHA51224e54e9a87ef605b809bcc5472b3a90f0d7245f0ce4a0ff9bf7d40cee5172347893aa5eacb40e24dfd92f39be0013a8b536e49a9ff96d4581dad7fa612f803a5