Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
Resource
win10v2004-20231215-en
General
-
Target
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
-
Size
79KB
-
MD5
b07b87409b652f297c8f5f91834e4f08
-
SHA1
781faeb6c45c6c7898ddf082f3a81b5565c14092
-
SHA256
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c
-
SHA512
d6007c5ad6ed71d440adc257eec9a4cd6aacb11ce4b5c9d9d50c3791b7f3b6d4e60f2aa091b0b2dcd2e405e3b827ce4906b56d5a502ae2ff0e4444ba88011394
-
SSDEEP
1536:zvS9+LJ8lZuCUuTOQA8AkqUhMb2nuy5wgIP0CSJ+5y6B8GMGlZ5G:zvS9O8lZuCmGdqU7uy5w9WMy6N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1212 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2416 cmd.exe 2416 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2416 1740 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 29 PID 1740 wrote to memory of 2416 1740 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 29 PID 1740 wrote to memory of 2416 1740 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 29 PID 1740 wrote to memory of 2416 1740 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 29 PID 2416 wrote to memory of 1212 2416 cmd.exe 30 PID 2416 wrote to memory of 1212 2416 cmd.exe 30 PID 2416 wrote to memory of 1212 2416 cmd.exe 30 PID 2416 wrote to memory of 1212 2416 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe"C:\Users\Admin\AppData\Local\Temp\317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1212
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5675e765c94a2d9ee648080106f1ff1f7
SHA1f91352dc84818245936557369662589702deee1f
SHA256a2efb53cda8cec9e10515563d1f69ded74cdd1087758088e06dddc6df2bcb302
SHA512c07efe040627a51d5a23253c40200bece3607e503e0ab53320ad17b56c96323d4abb74ee96057aec34784cf67b6fd5947ccd48998cf3757294b345c32b98333f