Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe
Resource
win10v2004-20240226-en
General
-
Target
723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe
-
Size
79KB
-
MD5
0e06d4eafc1b3aa4c7efac0146abf056
-
SHA1
ecb1867d3655f99b6fbdf2e9e1cc89b0936bc477
-
SHA256
723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a
-
SHA512
cff426ca28b11467160e582c9a34cd44bc36569e90863a0fc352a40cee6b249d2f856772c3d9c68f718d72a0daba4f715ccb65de662dfd47ee2ae9ff73a59850
-
SSDEEP
1536:zviSrOy6IQz0raGXOQA8AkqUhMb2nuy5wgIP0CSJ+5yjB8GMGlZ5G:zviSrr6IQ8FeGdqU7uy5w9WMyjN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2896 cmd.exe 2896 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2896 2648 723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe 29 PID 2648 wrote to memory of 2896 2648 723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe 29 PID 2648 wrote to memory of 2896 2648 723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe 29 PID 2648 wrote to memory of 2896 2648 723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe 29 PID 2896 wrote to memory of 2908 2896 cmd.exe 30 PID 2896 wrote to memory of 2908 2896 cmd.exe 30 PID 2896 wrote to memory of 2908 2896 cmd.exe 30 PID 2896 wrote to memory of 2908 2896 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe"C:\Users\Admin\AppData\Local\Temp\723e746254b124e954eef27bf0f44d17cf89357193db512ea85c7dc90c8cad9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2908
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d0ed9c8b3ecc0f438b46a7d92ca9b702
SHA1439edd3ec0c03bc0eb6d24fecd9be9594457bf87
SHA2568172b9c642a2a3f61a8dcb6e9593add5353e44850335b37a7eb7e47db2aa868c
SHA512de2d8ba368d3e243fc2619115b6f517286182e0186bf8535d33347223db7352d56f6e52bbb09ad612efe19abc2abf9e730bb06d6dc75d8c3d431fa5fb79f1725