Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe
Resource
win10v2004-20240508-en
General
-
Target
964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe
-
Size
79KB
-
MD5
31fef4eee662eb8cc3d18cb8854f39da
-
SHA1
73054c2c5f5befe88cb5f9681099feb066c0efb3
-
SHA256
964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0
-
SHA512
e48181d91e8f94b1fae82e29687eddd692ef2dd5df6942742322772b5553895d00bc95b7418a563ab1e4ce17ec036f538db34f394cd0c5f54c01bb88c9a450d6
-
SSDEEP
1536:zvzd/wcm5Gq33fmXo7OQA8AkqUhMb2nuy5wgIP0CSJ+5yQB8GMGlZ5G:zv6ca36oqGdqU7uy5w9WMyQN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 344 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2192 cmd.exe 2192 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.execmd.exedescription pid process target process PID 2184 wrote to memory of 2192 2184 964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe cmd.exe PID 2184 wrote to memory of 2192 2184 964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe cmd.exe PID 2184 wrote to memory of 2192 2184 964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe cmd.exe PID 2184 wrote to memory of 2192 2184 964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe cmd.exe PID 2192 wrote to memory of 344 2192 cmd.exe [email protected] PID 2192 wrote to memory of 344 2192 cmd.exe [email protected] PID 2192 wrote to memory of 344 2192 cmd.exe [email protected] PID 2192 wrote to memory of 344 2192 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe"C:\Users\Admin\AppData\Local\Temp\964cba16cb6d3ef9a5cadef8672c3d54925d333773f7af08342480f3ac6f1fa0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:344
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD518417ba62895542a6492212e17c09dec
SHA139d0d671a7563301ae379d8013552e9fa754ac02
SHA25638527750f6d3f38e25024b31fdcceb7c189726ddb17112656b21ecb0175f0469
SHA5126755997d84c35fd103787ce829ace269d307383afb5512ad99e2834a4659b32f0239fe6ae3bb8e8f5798d8305df62aa633ade8f3e08f8e7356b71f1c51bc9e59