Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
c14411dae1ccc60166a2bd9de2c337fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c14411dae1ccc60166a2bd9de2c337fd.exe
Resource
win10v2004-20240226-en
General
-
Target
c14411dae1ccc60166a2bd9de2c337fd.exe
-
Size
440KB
-
MD5
c14411dae1ccc60166a2bd9de2c337fd
-
SHA1
e0d787968c75146c6fd307ec06a0b75b0b9b3701
-
SHA256
ccb7ae711a23d94ddbe1e10bb6d37c05e6bde240997d8330c6744bdbc3fbf072
-
SHA512
6b71c0003c044e7d0203d466e0fbad6eba0bc8254f9c51d5e4dcaa1af8c438cdb24f798d3e7f10abb2d5b08ddf3ebb572d2278e51faa23bc059f5a93745ea863
-
SSDEEP
12288:mGwF8DRXgVPqaoXNoEixlbjDm+3z2A8UkiKemcXc+v8oQW:7zXKqa8SEijjC+378HOmcxh7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 712 ijsrvz.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\ehqp\ijsrvz.exe c14411dae1ccc60166a2bd9de2c337fd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3532 wrote to memory of 712 3532 c14411dae1ccc60166a2bd9de2c337fd.exe 91 PID 3532 wrote to memory of 712 3532 c14411dae1ccc60166a2bd9de2c337fd.exe 91 PID 3532 wrote to memory of 712 3532 c14411dae1ccc60166a2bd9de2c337fd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c14411dae1ccc60166a2bd9de2c337fd.exe"C:\Users\Admin\AppData\Local\Temp\c14411dae1ccc60166a2bd9de2c337fd.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\ehqp\ijsrvz.exe"C:\Program Files (x86)\ehqp\ijsrvz.exe"2⤵
- Executes dropped EXE
PID:712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD5d1ffc9fa5310515687a05f75ca9f0e95
SHA1df68d5fef4d7648e8e50c01580ebef4244655c3c
SHA256c0912d27c34d621becec8fc2f82054db2f950790197bbe9b699535f17d29e92f
SHA51229e4624f1ea3b239c8f0bd9ccc807833c4a607020b4e780f3f59f58be1ddd3947894e3e3633fdc002c2ffdd8a7327ac182dff2edc6c8bbe9013f24da6c7929c0