Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe
Resource
win10v2004-20240226-en
General
-
Target
e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe
-
Size
79KB
-
MD5
89955e11042181f9c95b35ad8722185e
-
SHA1
60fe7d73e647c4cdac2af9d52ec28f00757ed24d
-
SHA256
e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b
-
SHA512
1a97b73be527e01154240b497e11f652b4044573023246b13e53ff0446cfa64c6c85022bd15d67478fa7cd7ed0ff6a43490ddb6aeefdae48f268b77f8b444412
-
SSDEEP
1536:zvANfA7voIfaFOQA8AkqUhMb2nuy5wgIP0CSJ+5yBB8GMGlZ5G:zvANfvi9GdqU7uy5w9WMyBN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2200 cmd.exe 2200 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2200 2020 e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe 29 PID 2020 wrote to memory of 2200 2020 e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe 29 PID 2020 wrote to memory of 2200 2020 e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe 29 PID 2020 wrote to memory of 2200 2020 e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe 29 PID 2200 wrote to memory of 1540 2200 cmd.exe 30 PID 2200 wrote to memory of 1540 2200 cmd.exe 30 PID 2200 wrote to memory of 1540 2200 cmd.exe 30 PID 2200 wrote to memory of 1540 2200 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe"C:\Users\Admin\AppData\Local\Temp\e150db23ee56731b4929283d8e7bc66ef2c4588c42dd1859b52a3ea5decc051b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1540
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5525aa6a10eb132948fe460a11da33cee
SHA1115b056113651ad0044de79eec2a23fc4b5b28f5
SHA2565821147a9b7ae0101c066653222b09d93dce976132ea23986c9491c31da8dbc4
SHA5128ac22394aa9c3f03d70cb55755f9266e22d08d23e8cfae73011ab84172101565827d6ae063bb1e466654ff26013ad614eadf391d036b8abd758158b7562c6512