Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe
Resource
win10v2004-20240226-en
General
-
Target
ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe
-
Size
79KB
-
MD5
fc0a32a0ff1eb6eac23d171d1b91c0b9
-
SHA1
9bc62439f2c3c14ea3c4d9745c84aeaa18d45729
-
SHA256
ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf
-
SHA512
5ab59fabbbbf31e01076ae05b42c8a03b227ab428ede3d2be73b7546b92bdbbe45fd76f9801ebcaf187fdcf98d8cf66774688447de4276ab5619f92936340fee
-
SSDEEP
1536:zvlIj2RxFr51zXOQA8AkqUhMb2nuy5wgIP0CSJ+5yqB8GMGlZ5G:zvqjWFr+GdqU7uy5w9WMyqN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2480 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2492 cmd.exe 2492 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2492 2444 ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe 29 PID 2444 wrote to memory of 2492 2444 ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe 29 PID 2444 wrote to memory of 2492 2444 ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe 29 PID 2444 wrote to memory of 2492 2444 ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe 29 PID 2492 wrote to memory of 2480 2492 cmd.exe 30 PID 2492 wrote to memory of 2480 2492 cmd.exe 30 PID 2492 wrote to memory of 2480 2492 cmd.exe 30 PID 2492 wrote to memory of 2480 2492 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe"C:\Users\Admin\AppData\Local\Temp\ed30f02729c0f5ac176833008d834ece4f07ea3586ac3b1051826cd67a8fe1bf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2480
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD53ffe5f71fd2f83fe5eb93e0c84725209
SHA1021759aba50032e07a6a442372d2c045415fa0a9
SHA256263d328a3b83033bb3bc2a0750f81468f5523f99ac0e77403f5fe62fa270790e
SHA51257fd5485af3a90550f9ee1f70f736a628973a8ee9c3afa2fffbafff9c04e1825da0b3b7fdab32c98575cba2ebb871c4132a8e07ee40a479560ac60fea2afbdb3