Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe
Resource
win10v2004-20240426-en
General
-
Target
19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe
-
Size
73KB
-
MD5
d81cfbaa340ab553e0b3d7ff0ba91191
-
SHA1
7a471133a7b66abd0ed22a96628847fb90cf08d8
-
SHA256
19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e
-
SHA512
7c08c11ae12a3d77d5ea78641d100f98085a08ecb643e93c62ff281b1397f889103c129a5f62d9c7f484c8cb2ce394dce2ed3a13f293feb74173f38319dd2588
-
SSDEEP
1536:hbHb02kWimRWgjimu0K5QPqfhVWbdsmA+RjPFLC+e5hK0ZGUGf2g:hTbbUgjxu0NPqfcxA+HFshKOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2024 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2108 cmd.exe 2108 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2892 wrote to memory of 2108 2892 19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe cmd.exe PID 2892 wrote to memory of 2108 2892 19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe cmd.exe PID 2892 wrote to memory of 2108 2892 19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe cmd.exe PID 2892 wrote to memory of 2108 2892 19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe cmd.exe PID 2108 wrote to memory of 2024 2108 cmd.exe [email protected] PID 2108 wrote to memory of 2024 2108 cmd.exe [email protected] PID 2108 wrote to memory of 2024 2108 cmd.exe [email protected] PID 2108 wrote to memory of 2024 2108 cmd.exe [email protected] PID 2024 wrote to memory of 2256 2024 [email protected] cmd.exe PID 2024 wrote to memory of 2256 2024 [email protected] cmd.exe PID 2024 wrote to memory of 2256 2024 [email protected] cmd.exe PID 2024 wrote to memory of 2256 2024 [email protected] cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe"C:\Users\Admin\AppData\Local\Temp\19f9f3ed2368c109f7fe6c29e10283148f42f7d08b4fdfdbe23a0d406400f95e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 15225.exe4⤵PID:2256
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5076ec61d8e82c9dafee698b072e23972
SHA12535081c7507f8ea1e80b760beea7d8ccbeb7eee
SHA2561ec2216d2cf7e4341d1e5de79379130e0b3bb4b43d48f5d24b9ed13a83f24a2d
SHA512c55b2f0eee560378daace4773c84dca5c0787d4c836cafacf3c4f7d5142a4fd66c17c0151f2c26854645609151d7c33328843203511c3e7223fdbd079f570fc1