Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe
Resource
win10v2004-20231215-en
General
-
Target
571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe
-
Size
79KB
-
MD5
a1b18dd7242554bff47a1f6cad457e56
-
SHA1
8777f45119f07df58ec99a98cd76d2af1dff1d67
-
SHA256
571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4
-
SHA512
cb79be9dbd8d0ab420b45909257bbfae52c77abe7ddbc675c1c4d414068aef59bf1927af261c8a0768c2ead237650cb0d9df402ba88c599a4b3862805b4aff14
-
SSDEEP
1536:zvI/UIvqd/7oYvzsYaKOQA8AkqUhMb2nuy5wgIP0CSJ+5yuK1B8GMGlZ5G:zvIZqdDNsYa/GdqU7uy5w9WMyuK1N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1924 cmd.exe 1924 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1924 1228 571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe 29 PID 1228 wrote to memory of 1924 1228 571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe 29 PID 1228 wrote to memory of 1924 1228 571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe 29 PID 1228 wrote to memory of 1924 1228 571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe 29 PID 1924 wrote to memory of 1740 1924 cmd.exe 30 PID 1924 wrote to memory of 1740 1924 cmd.exe 30 PID 1924 wrote to memory of 1740 1924 cmd.exe 30 PID 1924 wrote to memory of 1740 1924 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe"C:\Users\Admin\AppData\Local\Temp\571afeba19f9baa8152a82e0f486e7f53637aa929d4a126278aa66d65bee09b4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1740
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5326824efc270d8ece45330b5651871fe
SHA15fd6a410aa6bb853810603f16e91f2ecce065925
SHA256d1f1262fbd689cfc8137a87dc681012f6b01aa411d5aab35e1064f7b3d9e1fdd
SHA512db85fe9f70dfa5855b002b4107e068e65f0cbe8611c25a716e6c8e13ac364b319591198974d0a1186f28a3c5f45337cfa27d9bad4d5aed86f07c0947e1053540