Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe
Resource
win10v2004-20240426-en
General
-
Target
23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe
-
Size
73KB
-
MD5
c53919daec1e8b462a5a4e03df44db6c
-
SHA1
b5f76cbba6f03fdc9141311e3a7150d493ec08ff
-
SHA256
23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098
-
SHA512
398820655aaa4c9d0dc76e6869d9ef275578bd4be9ffe92f06ec4220378baa98910acef83769b4fd1019863df00e6e000f1e01c493b98d2daa774d490cc6e13c
-
SSDEEP
1536:hbNwI5iP+q/zK5QPqfhVWbdsmA+RjPFLC+e5hp0ZGUGf2g:hGI5i2AzNPqfcxA+HFshpOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 3496 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
description pid process target process PID 2688 wrote to memory of 3188 2688 23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe cmd.exe PID 2688 wrote to memory of 3188 2688 23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe cmd.exe PID 2688 wrote to memory of 3188 2688 23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe cmd.exe PID 3188 wrote to memory of 3496 3188 cmd.exe [email protected] PID 3188 wrote to memory of 3496 3188 cmd.exe [email protected] PID 3188 wrote to memory of 3496 3188 cmd.exe [email protected] PID 3496 wrote to memory of 2720 3496 [email protected] cmd.exe PID 3496 wrote to memory of 2720 3496 [email protected] cmd.exe PID 3496 wrote to memory of 2720 3496 [email protected] cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe"C:\Users\Admin\AppData\Local\Temp\23d521c7cdd06c03ddcb60c2e40fe36756db0209539affce8c5723f45538f098.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exePID:3188
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2720
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD50112f865acd6306bcd19bbb1ca0c3cf9
SHA13fce2ecd3916f0f984ffa868af412dac4d34dc22
SHA256c3e71482dc736fce9b5a9a07b25fd4164033071d4b852ad3dfc2c4ff3182bf9c
SHA51237986e7e356df6de0a0abfcac5a83c2a39fa46630560e9f6f83d79ac93464d6d4a5b1155c43543ba55a25b5d61d4ce1593a96461a3197cc1de7ba61daeac8132
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1