Analysis
-
max time kernel
140s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
Resource
win10v2004-20240508-en
General
-
Target
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe
-
Size
79KB
-
MD5
84ac9df964e1b3f3387430fd90263973
-
SHA1
571c7af838ef762b7a9616347c00e12c5126312b
-
SHA256
9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3
-
SHA512
93349759673fa9d8f80ffdba733eaadbda7c26f0d8e6876975c5ae970b8639ebdaba81a3adeb728e14f41955b5f9d5ba5635e53c4590d9ebae56710ed602b467
-
SSDEEP
1536:zvvSjrPgawlHWzMLP0OOQA8AkqUhMb2nuy5wgIP0CSJ+5yXB8GMGlZ5G:zvvSj8aKHWgLP0bGdqU7uy5w9WMyXN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3316 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2312 wrote to memory of 4048 2312 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 84 PID 2312 wrote to memory of 4048 2312 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 84 PID 2312 wrote to memory of 4048 2312 9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe 84 PID 4048 wrote to memory of 3316 4048 cmd.exe 85 PID 4048 wrote to memory of 3316 4048 cmd.exe 85 PID 4048 wrote to memory of 3316 4048 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe"C:\Users\Admin\AppData\Local\Temp\9d09527f57e62a82838de56b5f29451d1fe7e39b011fe13d9d203f5741640ab3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exePID:4048
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3316
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5afbfbe244670d90dcd146f043cfb4a59
SHA154a2c077a0475783c81f06a9079a4a9089567c74
SHA25690cbf451e58018230d9db45d76299fd162d30ef91077467e197d775de0acac05
SHA512084d2984d52bb18905da0c11f0127fb234c03e3d8219bbe58c6392dd0b327389e216e61e9e9fd16dd9443f8e0ec05f88905f8311da8ee7fd055b12bdb2d1dfb1