Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
Resource
win10v2004-20240419-en
General
-
Target
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
-
Size
79KB
-
MD5
3a68a8a114014f0db88ddd51dd4aa01d
-
SHA1
f015f647472044ba1aee968b6dfcf4d280e3014e
-
SHA256
4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4
-
SHA512
09d9998bc42574bd469f959316dcbf8e67f3a96fb7a0ecc9e29b545cff26a492b87b57397ffba83f0fd36b3b868240ec8e9dd0320f61d0817b4e86e74d5ce3aa
-
SSDEEP
1536:zv/kDzjjSOQA8AkqUhMb2nuy5wgIP0CSJ+5yHBB8GMGlZ5G:zvsbGdqU7uy5w9WMyhN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2656 cmd.exe 2656 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2656 1276 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 29 PID 1276 wrote to memory of 2656 1276 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 29 PID 1276 wrote to memory of 2656 1276 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 29 PID 1276 wrote to memory of 2656 1276 4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe 29 PID 2656 wrote to memory of 2760 2656 cmd.exe 30 PID 2656 wrote to memory of 2760 2656 cmd.exe 30 PID 2656 wrote to memory of 2760 2656 cmd.exe 30 PID 2656 wrote to memory of 2760 2656 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe"C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2760
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD50afdb37be14826c25d34727cc8495e11
SHA15e2b8d8f7a1cf30a06fcae7b40e9e744c4548a0b
SHA256ae706b527ea28664ac48fd74415804d38b8938d182003094f6bc8b236dab6a9e
SHA512a7630b5372696c9a6c04c53af27f8a21f597f3c98073c47389fcc2519484e7720fcfc5a15bd636167b683ec5a36116e2b13192d78f21e0201cdccdcee3106aa4