Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-04-2024 07:25
Behavioral task
behavioral1
Sample
Copy Server.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Copy Server.exe
-
Size
17.0MB
-
MD5
c22ec0781c1039f0dcac6604ddd2cd16
-
SHA1
6adb6d849499ef8b13bf6dc1e1f399623eb6502d
-
SHA256
1f0b5bf2acb3d65094bad84bed510dde2981d43adb1dd1753d7616234be434b4
-
SHA512
08fcab486f47d1019286cf35db903a771377561d69a3e1ad23342398be3032e2d457c7dd55a2fb32ee6974a248378d590c4ddda30bab8f8799feb79a8ac15fae
-
SSDEEP
393216:aWHiIE7YoPQK9dM/IS+DfDgrc6ZczfnDfuF:Dc7rPQKT6IS+b0IBzfDf
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2396 Copy Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2396 2656 Copy Server.exe 28 PID 2656 wrote to memory of 2396 2656 Copy Server.exe 28 PID 2656 wrote to memory of 2396 2656 Copy Server.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Copy Server.exe"C:\Users\Admin\AppData\Local\Temp\Copy Server.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Copy Server.exe"C:\Users\Admin\AppData\Local\Temp\Copy Server.exe"2⤵
- Loads dropped DLL
PID:2396
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:704
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:580
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b