Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
вирус_v2.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
вирус_v2.0.exe
Resource
win10v2004-20240226-en
General
-
Target
вирус_v2.0.exe
-
Size
155KB
-
MD5
cd564358f2933adb4259afb672f19911
-
SHA1
a86753eeb0339f625148b76e4a7fe2f85a8858cc
-
SHA256
dbc8b3f55307575516d50e820affb2f8f623a9ebc9844fbc4d1e4c8cdef8ff1e
-
SHA512
b74f61a6e599fe37607b71c1979159773f63045a916c30154f06b73150b763e1332c040457dd722dc881978492f50cbd29e8d003cacff80cb06966d4a785a0cb
-
SSDEEP
3072:raFfHgTWmCRkGbKGLeNTBfT16FY24wR+UIDBLCZ/F:W5aWbksiNTBL1sl
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\fixmxn.exe cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2200 2208 вирус_v2.0.exe 29 PID 2208 wrote to memory of 2200 2208 вирус_v2.0.exe 29 PID 2208 wrote to memory of 2200 2208 вирус_v2.0.exe 29 PID 2208 wrote to memory of 2200 2208 вирус_v2.0.exe 29 PID 2736 wrote to memory of 1360 2736 вирус_v2.0.exe 37 PID 2736 wrote to memory of 1360 2736 вирус_v2.0.exe 37 PID 2736 wrote to memory of 1360 2736 вирус_v2.0.exe 37 PID 2736 wrote to memory of 1360 2736 вирус_v2.0.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6548.tmp\6549.tmp\654A.bat C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"2⤵PID:2200
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7ABB.tmp\7ACC.tmp\7ACD.bat C:\Users\Admin\AppData\Local\Temp\вирус_v2.0.exe"2⤵
- Drops file in System32 directory
PID:1360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246B
MD5bdbebba28b6b37e48a6e0a0baa3837cd
SHA14bb511e888997be7ebac0b5d8ff1f90be6141843
SHA2564c30117451d4e1a235f30a6a3d0ff654fd179caaca0edb3e20f7aafedc22df12
SHA512422f6af590fae3c50d4259a52d025e603229e741d7be93a13573ab64a747a3199658400888e972e0255566afc2d721c335041cca05b4142d46630540867b875d