Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe
Resource
win10v2004-20240226-en
General
-
Target
7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe
-
Size
73KB
-
MD5
ac8da94172a8f453ae38f610f2a2b975
-
SHA1
799607157eeedaed2d1171e2a8ab4297e4aeef3d
-
SHA256
7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286
-
SHA512
45369ffcce525db1a1d453323496c2d777dc808bff2629994c59d3c1c17b963fd53e4857ec3f1fb1207a0747362b3d2bb8095095c25a43e1b4c4400dca82ca25
-
SSDEEP
1536:hbKBnHwK5QPqfhVWbdsmA+RjPFLC+e5hp0ZGUGf2g:hGBHwNPqfcxA+HFshpOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2860 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1928 cmd.exe 1928 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 1732 wrote to memory of 1928 1732 7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe cmd.exe PID 1732 wrote to memory of 1928 1732 7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe cmd.exe PID 1732 wrote to memory of 1928 1732 7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe cmd.exe PID 1732 wrote to memory of 1928 1732 7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe cmd.exe PID 1928 wrote to memory of 2860 1928 cmd.exe [email protected] PID 1928 wrote to memory of 2860 1928 cmd.exe [email protected] PID 1928 wrote to memory of 2860 1928 cmd.exe [email protected] PID 1928 wrote to memory of 2860 1928 cmd.exe [email protected] PID 2860 wrote to memory of 3028 2860 [email protected] cmd.exe PID 2860 wrote to memory of 3028 2860 [email protected] cmd.exe PID 2860 wrote to memory of 3028 2860 [email protected] cmd.exe PID 2860 wrote to memory of 3028 2860 [email protected] cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe"C:\Users\Admin\AppData\Local\Temp\7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:3028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD51febae94c8d4677a9f1cbd4fe121e0ea
SHA1f8e59a09e1de9c9f49eb54b6d4c9ee73f5f0d2bf
SHA25674f2c4d48bc32398bb050c3c912c19ee3d07fa14aaf02d2d01e9849ffc4642e9
SHA5126d79fa9896553c5a19c559e5a05ab0cb36df6a6a2c19166b9f3dd5b3e94fdda88c37ea4a311feec8b6e748bfadc5e447c7fe6e91169a8e0889dd02f85eca0889