Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe
Resource
win10v2004-20240226-en
General
-
Target
beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe
-
Size
79KB
-
MD5
24409c52ddf4ac02ad176562676e5ee4
-
SHA1
f26cae7fd1bb2598aeed92f4e1e5917aa8a26e4e
-
SHA256
beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f
-
SHA512
f39ee2705fd0f493e782a29e08918583b66d70165f53ce9caa7d7213c183ef802259374b59afcd2f58317dcdee16b948cee49a0d74eff13ce8820a4c2f24ee2f
-
SSDEEP
1536:zv1FbW6fkOQA8AkqUhMb2nuy5wgIP0CSJ+5yeB8GMGlZ5G:zvrW6fBGdqU7uy5w9WMyeN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2100 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2560 cmd.exe 2560 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2560 2572 beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe 30 PID 2572 wrote to memory of 2560 2572 beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe 30 PID 2572 wrote to memory of 2560 2572 beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe 30 PID 2572 wrote to memory of 2560 2572 beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe 30 PID 2560 wrote to memory of 2100 2560 cmd.exe 31 PID 2560 wrote to memory of 2100 2560 cmd.exe 31 PID 2560 wrote to memory of 2100 2560 cmd.exe 31 PID 2560 wrote to memory of 2100 2560 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe"C:\Users\Admin\AppData\Local\Temp\beedabaa4ae0a0625cdbaf9d8207b548c7799f91a357b00f5fa1b61e3d00534f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2100
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5aceb3e5a5929bd1ad014cfd9be2903ea
SHA134eb69b055a28d9ef6c52df2d3dd0e61953a6557
SHA256ecdc966ebe3ca50400938ab49361daf6dc0453cd84ae9683a7331af92d964b6d
SHA512bb083dc41414b2c3c71799699f44034dc44dc4e71c604424f858ba7dc6572e42d0cd534bda6d8c51c44a3a5aa06a02cd9ce14218a343014d2fff6bbdda9d5e62