Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe
Resource
win10v2004-20240226-en
General
-
Target
3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe
-
Size
79KB
-
MD5
f9e3d0d35033be0b1bd5ca596dd531ad
-
SHA1
da5b6a803514bfbb0595ac1e5a02beb81c279209
-
SHA256
3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173
-
SHA512
b35860850f3342260848eb859a11dd689af5c5349d92dfd56dd5371bbfa88da15c365132a099c04c0a5631a04f8329d2ae4a8397dde9a12855712b4f204d0ffc
-
SSDEEP
1536:zv6fdjP2uMHZAOQA8AkqUhMb2nuy5wgIP0CSJ+5yWB8GMGlZ5G:zv652PjGdqU7uy5w9WMyWN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2032 cmd.exe 2032 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2032 2072 3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe 29 PID 2072 wrote to memory of 2032 2072 3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe 29 PID 2072 wrote to memory of 2032 2072 3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe 29 PID 2072 wrote to memory of 2032 2072 3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe 29 PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1896 2032 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe"C:\Users\Admin\AppData\Local\Temp\3dce0d418820d9ea6ce5966c6aff30fb212f309377696169a5f50382bca75173.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1896
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5177a0e33d08dfc376713bcc61740700d
SHA1e6a0a726f337d004ea058cc1bb3c0ecef3238ce6
SHA2563944b045dd07a0892033aac4c8a34f92fa12aaa3bdc6889b3d3f712d0c9a1232
SHA512a12e5ba7515cb1eeb7e7af9a3952b50db7edfad9668d1cb65405e916321ac956672f1b41481c3172fa5100057cff46db0be1fba589d99d7483562653d70ce757