Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe
Resource
win10v2004-20240508-en
General
-
Target
483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe
-
Size
79KB
-
MD5
cc9dd9a95c0667a9f5b886b1d6d3cbcc
-
SHA1
afaa8de91659d0253f92a0777a5b916d6bad97fe
-
SHA256
483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab
-
SHA512
46162798913a66a97320914870fc74c0d2559628f3024732d294bdea171ff569f2ccd9351a331651180c10ae597cc32c41c2c7dedb233ad9347b4ff18e2f0dbd
-
SSDEEP
1536:zvK8wXOsol+f9OQA8AkqUhMb2nuy5wgIP0CSJ+5yPB8GMGlZ5G:zvKfNoQMGdqU7uy5w9WMyPN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2648 cmd.exe 2648 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 620 wrote to memory of 2648 620 483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe 29 PID 620 wrote to memory of 2648 620 483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe 29 PID 620 wrote to memory of 2648 620 483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe 29 PID 620 wrote to memory of 2648 620 483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe 29 PID 2648 wrote to memory of 2744 2648 cmd.exe 30 PID 2648 wrote to memory of 2744 2648 cmd.exe 30 PID 2648 wrote to memory of 2744 2648 cmd.exe 30 PID 2648 wrote to memory of 2744 2648 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe"C:\Users\Admin\AppData\Local\Temp\483af6df8ec0f755a71fed74f90d6738afa33d7401faf3ac141f51ca2f2f05ab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2744
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD59e1723c2e4372b82cd9dc2629e58c617
SHA158b25f18ae7994dd3d1b67864ca4de5f55511f80
SHA256b2f9ba0b72c667f7f9d388feaef5152f017052af397c3601e1e0e6694e5be01e
SHA512f74933422b2a55415a337acef6c8984c037bc22a9d9f861411f1dc58e752717ef10dd8ff3d7fb4aeb4b6a1302f848a60c70d88490b35f51da112e91e65e43637