Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
Resource
win10v2004-20240508-en
General
-
Target
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
-
Size
79KB
-
MD5
84ac9df964e1b3f3387430fd90263973
-
SHA1
571c7af838ef762b7a9616347c00e12c5126312b
-
SHA256
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3
-
SHA512
93349759673fa9d8f80ffdba733eaadbda7c26f0d8e6876975c5ae970b8639ebdaba81a3adeb728e14f41955b5f9d5ba5635e53c4590d9ebae56710ed602b467
-
SSDEEP
1536:zvvSjrPgawlHWzMLP0OOQA8AkqUhMb2nuy5wgIP0CSJ+5yXB8GMGlZ5G:zvvSj8aKHWgLP0bGdqU7uy5w9WMyXN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1676 cmd.exe 1676 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1676 2084 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 29 PID 2084 wrote to memory of 1676 2084 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 29 PID 2084 wrote to memory of 1676 2084 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 29 PID 2084 wrote to memory of 1676 2084 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 29 PID 1676 wrote to memory of 1720 1676 cmd.exe 30 PID 1676 wrote to memory of 1720 1676 cmd.exe 30 PID 1676 wrote to memory of 1720 1676 cmd.exe 30 PID 1676 wrote to memory of 1720 1676 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe"C:\Users\Admin\AppData\Local\Temp\9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1720
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5afbfbe244670d90dcd146f043cfb4a59
SHA154a2c077a0475783c81f06a9079a4a9089567c74
SHA25690cbf451e58018230d9db45d76299fd162d30ef91077467e197d775de0acac05
SHA512084d2984d52bb18905da0c11f0127fb234c03e3d8219bbe58c6392dd0b327389e216e61e9e9fd16dd9443f8e0ec05f88905f8311da8ee7fd055b12bdb2d1dfb1