Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe
Resource
win10v2004-20240508-en
General
-
Target
944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe
-
Size
79KB
-
MD5
60701ea7084819139079a760b26273ac
-
SHA1
ff8f5f906b54f3d5fbbe422dcd11a693ea1a36cf
-
SHA256
944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce
-
SHA512
67f7984259a607abe69015e505a6da24e6f0d551791b4460684b9215a36d6a658ec718c6f07defcf4e48ad7898e291c8cec5f46d9cd5df30181d3278c25e0d6a
-
SSDEEP
1536:zv3JmHlv340W6OQA8AkqUhMb2nuy5wgIP0CSJ+5yRB8GMGlZ5G:zvZmHlvfWPGdqU7uy5w9WMyRN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2712 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1300 cmd.exe 1300 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.execmd.exedescription pid process target process PID 2220 wrote to memory of 1300 2220 944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe cmd.exe PID 2220 wrote to memory of 1300 2220 944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe cmd.exe PID 2220 wrote to memory of 1300 2220 944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe cmd.exe PID 2220 wrote to memory of 1300 2220 944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe cmd.exe PID 1300 wrote to memory of 2712 1300 cmd.exe [email protected] PID 1300 wrote to memory of 2712 1300 cmd.exe [email protected] PID 1300 wrote to memory of 2712 1300 cmd.exe [email protected] PID 1300 wrote to memory of 2712 1300 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe"C:\Users\Admin\AppData\Local\Temp\944a49f57452c4f58aa85e1a2b1e5b33f8e7a142f3cdd07cce7dcd99a3090dce.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2712
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD504105d660c34569a7b0ef461d44dc9cf
SHA19d956dbf0ce1e3ac529610af878ea99a6238c526
SHA256cfb18086aeab81f1031c442f93ebe9e250c81ef4af0cc3239889434f0e0a352f
SHA5121fe48d5d7ff734b844f266abbdfb6859deaee579ca6a3d86ba5ebb24cbb4e0ab7755d6ba94788308121763c9a21277abbd49026bfb6b09b7d8e893afec320f82