Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe
Resource
win10v2004-20240508-en
General
-
Target
3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe
-
Size
79KB
-
MD5
05c4fc3588b02fc125c7351ab56fcb1b
-
SHA1
6344510e96d093fd26e489bc8e0249a8340136ac
-
SHA256
3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b
-
SHA512
034a0b0a3ded11116c98c0ee4422ea5a4703a8fa561f8ce189f30f0c66bfaccf9fa07731f6124d7f6d22d98eeb747eb6821091ac9e9bd42193afa3277a823563
-
SSDEEP
1536:zvBhcIFGoQftrSOQA8AkqUhMb2nuy5wgIP0CSJ+5ybB8GMGlZ5G:zvqrXGdqU7uy5w9WMybN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2064 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1924 cmd.exe 1924 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.execmd.exedescription pid process target process PID 2080 wrote to memory of 1924 2080 3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe cmd.exe PID 2080 wrote to memory of 1924 2080 3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe cmd.exe PID 2080 wrote to memory of 1924 2080 3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe cmd.exe PID 2080 wrote to memory of 1924 2080 3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe cmd.exe PID 1924 wrote to memory of 2064 1924 cmd.exe [email protected] PID 1924 wrote to memory of 2064 1924 cmd.exe [email protected] PID 1924 wrote to memory of 2064 1924 cmd.exe [email protected] PID 1924 wrote to memory of 2064 1924 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe"C:\Users\Admin\AppData\Local\Temp\3b0c7fdba161cfd895bb1bac488ca0ce664c438508ad7f900cad12e27bdfc77b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2064
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5f01d4aa1b33c3de4e083da56ea0942c1
SHA1727ef99d0c983d5ce01c7a54ad26b48d3d295234
SHA2565af1cdb2327387e6a0997fbb523a823d3233674cd6fb185995efbe31ea69c855
SHA512e704f3881cef5f58a1eb2235c4368facf8dcac63536375b7f3754801b7fd53f3104a182b7fcdbf76da7cd635d87ec46a2703cfaf4a52f522764b959af4c264da