Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe
Resource
win10v2004-20240508-en
General
-
Target
7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe
-
Size
79KB
-
MD5
9b71d0e10961eac75105a48ec0b5e35b
-
SHA1
f24464ab4ad7b3fab8f2c4ba0238fa10e6531258
-
SHA256
7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7
-
SHA512
ef7cdf1713b2aec367402a98b89ae520f395b3d0a6741b805f482f7977595e556927590d9a14320817796cc1bf44112998f4d9062616e61713f10fcf3ed11cb9
-
SSDEEP
1536:zvS9+LJ8lZuCUuTOQA8AkqUhMb2nuy5wgIP0CSJ+5y9B8GMGlZ5G:zvS9O8lZuCmGdqU7uy5w9WMy9N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 1936 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2088 cmd.exe 2088 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.execmd.exedescription pid process target process PID 944 wrote to memory of 2088 944 7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe cmd.exe PID 944 wrote to memory of 2088 944 7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe cmd.exe PID 944 wrote to memory of 2088 944 7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe cmd.exe PID 944 wrote to memory of 2088 944 7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe cmd.exe PID 2088 wrote to memory of 1936 2088 cmd.exe [email protected] PID 2088 wrote to memory of 1936 2088 cmd.exe [email protected] PID 2088 wrote to memory of 1936 2088 cmd.exe [email protected] PID 2088 wrote to memory of 1936 2088 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe"C:\Users\Admin\AppData\Local\Temp\7dacb65b55e14aac0ffbb5a112f75b53df8fb94fe96de92906b74ad687109be7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1936
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5e3c1112a0dace414a0a2ff0c71af2f5e
SHA15da3a73b59b9b801a95fd9d8bd7d9b7d6446bcad
SHA25688abfc09eeea169e7513dfed7538ca75f7c79330a7a254701b60551957bdd751
SHA512ecdc53b0714e00aab65b92345b08cd1127e5cab74948f9e931d8f0f4cffe174fdaba4da10761ccda2d42bcfff36499b05fddb64411c173f12403eab23390bb7a