Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe
Resource
win10v2004-20240226-en
General
-
Target
75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe
-
Size
79KB
-
MD5
09587d958abd01f34545926ee56549d0
-
SHA1
650b29b50b434a5231f4fd4525015281eda54de2
-
SHA256
75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35
-
SHA512
aa00290e5b44d82e82de9f93eb3a06188e5ab46eabbb28f10fc60e9e29937c30ac67e3e33f9ca1c1683399004ed153b9529af911d54de97b65ce349d8dd19d44
-
SSDEEP
1536:zvdtbD/STEiCoOQA8AkqUhMb2nuy5wgIP0CSJ+5y8B8GMGlZ5G:zvdtPS7CtGdqU7uy5w9WMy8N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 768 cmd.exe 768 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 768 2932 75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe 29 PID 2932 wrote to memory of 768 2932 75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe 29 PID 2932 wrote to memory of 768 2932 75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe 29 PID 2932 wrote to memory of 768 2932 75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe 29 PID 768 wrote to memory of 2064 768 cmd.exe 30 PID 768 wrote to memory of 2064 768 cmd.exe 30 PID 768 wrote to memory of 2064 768 cmd.exe 30 PID 768 wrote to memory of 2064 768 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe"C:\Users\Admin\AppData\Local\Temp\75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2064
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD521048f8f62cdf3ebe2ded216ef88691d
SHA116ff864a0b98cd26590c971ec0eb48102dca8394
SHA256419a2ace128f4b29b840bcdeba8c5957ea45819547944c1cadf264e9248deda7
SHA512bf1d91c66bc88ea75a84c11f0bb50d19de0ff91dcdb61784f2fa69d54ad425f81267ed4f0364bf9e64363cdba5ffc894b83e0d2e51b7b891e4e90ead6d0a2669