Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe
Resource
win10v2004-20240226-en
General
-
Target
062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe
-
Size
79KB
-
MD5
585d51545c61cb84ecfb4cb52d98cb38
-
SHA1
d1a534f24e34ecf7f3948c89e883deec1dc65b21
-
SHA256
062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810
-
SHA512
dc091bb47290b6ae7f9267138dced85977ea0844de11debb69d6bd328464a9239dcd7d173ca4d280ddd1a7ca532445881b7c226108067a85470132984df01f33
-
SSDEEP
1536:zvQsuJ0L7bX+xwbNja0OQA8AkqUhMb2nuy5wgIP0CSJ+5ygB8GMGlZ5G:zvI0L7bX++bxaxGdqU7uy5w9WMygN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2216 cmd.exe 2216 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2216 1044 062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe 29 PID 1044 wrote to memory of 2216 1044 062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe 29 PID 1044 wrote to memory of 2216 1044 062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe 29 PID 1044 wrote to memory of 2216 1044 062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe 29 PID 2216 wrote to memory of 3040 2216 cmd.exe 30 PID 2216 wrote to memory of 3040 2216 cmd.exe 30 PID 2216 wrote to memory of 3040 2216 cmd.exe 30 PID 2216 wrote to memory of 3040 2216 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe"C:\Users\Admin\AppData\Local\Temp\062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3040
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD573ce19b332b08595f52172a8dad61481
SHA17b89b26acc6f1cb5ff09c6c694aea3f7b9e41b6e
SHA2565dad95034f3074b13a7334b859c964516626ea23d7b7623a63590ff35f8bc2e7
SHA512230de40d8dfa0bd5241fe16de88c5cb44927144058bda37e4ef9750e984d4e42a109df2fc98cee8539ab1b6d4be776931042fb2bb231b5430d8d14634aaf6d9f