Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe
Resource
win10v2004-20240226-en
General
-
Target
d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe
-
Size
79KB
-
MD5
2fc88d84cc0721dbff1270798d91132b
-
SHA1
193f450c13d1cab097e8fce87f407b189aa1882c
-
SHA256
d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477
-
SHA512
2ee45143a7012c966dc8ab9cf7dc95a6140cd7227a82d83ec811819abfeb1e954eb2e9480e5f3cb164745b259f8604338c833cec23989e9b17153aa189a6f274
-
SSDEEP
1536:zvf6/+vpUy6QOQA8AkqUhMb2nuy5wgIP0CSJ+5yoAB8GMGlZ5G:zvvR4FGdqU7uy5w9WMyLN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2628 cmd.exe 2628 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2628 1612 d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe 29 PID 1612 wrote to memory of 2628 1612 d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe 29 PID 1612 wrote to memory of 2628 1612 d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe 29 PID 1612 wrote to memory of 2628 1612 d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe 29 PID 2628 wrote to memory of 2012 2628 cmd.exe 30 PID 2628 wrote to memory of 2012 2628 cmd.exe 30 PID 2628 wrote to memory of 2012 2628 cmd.exe 30 PID 2628 wrote to memory of 2012 2628 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe"C:\Users\Admin\AppData\Local\Temp\d5d2f276487c14a25e196f8d22c42d41f791a170b2ed3e25066bf207939ec477.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2012
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d2546072891d9039c158d7925bb3db77
SHA1be9676353848e9719f156a78d4a378e20474866a
SHA2569c1d315d62a0b07bb105141abac946fe60f3b84acbcab5863e938ad39c9cd41f
SHA5129eb4691afadd7cbcc6dfe9b9cd4fa5272805a4d111983b0838de1b3e832636e24687ae9287cbedb1922d19871c41df1d4caa80a52cf988b4cddaa7b0407e1b03