Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe
Resource
win10v2004-20240508-en
General
-
Target
81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe
-
Size
79KB
-
MD5
300f009d842ab0aead365e7a385b309f
-
SHA1
8ed03d64c5c37c2ed9c2bd5a9633607642f7154f
-
SHA256
81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3
-
SHA512
b6cdde2fb6c854e6489d7f2557ae1714a8b287ee342438b7543f38410273cf3a38b2be57659e01628ddb4a5ce0f61cf1451442bd9d3776387478f16c29ce1c79
-
SSDEEP
1536:zvDsKQrhOuesLDz2OQA8AkqUhMb2nuy5wgIP0CSJ+5yNB8GMGlZ5G:zv1QBLfTGdqU7uy5w9WMyNN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 1496 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2220 cmd.exe 2220 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.execmd.exedescription pid process target process PID 2820 wrote to memory of 2220 2820 81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe cmd.exe PID 2820 wrote to memory of 2220 2820 81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe cmd.exe PID 2820 wrote to memory of 2220 2820 81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe cmd.exe PID 2820 wrote to memory of 2220 2820 81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe cmd.exe PID 2220 wrote to memory of 1496 2220 cmd.exe [email protected] PID 2220 wrote to memory of 1496 2220 cmd.exe [email protected] PID 2220 wrote to memory of 1496 2220 cmd.exe [email protected] PID 2220 wrote to memory of 1496 2220 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe"C:\Users\Admin\AppData\Local\Temp\81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5b26d2b8aec3638208a1a98365eec71d6
SHA13e40a24d73eb9bbaefaeb4d6e6b3c90d2b272f55
SHA25697e30ed712b60cbf169dfbbdc4b5da5d85b13fe980da27a8187f5fdb10218343
SHA512a309795d81eb641084fbf3cad34d3154c19821ea9be7a771bc8e99209225759b9305f0543e14d5753659e2e8c8ef345bb924b27aa712640626f16fec524f9b59