Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
Resource
win10v2004-20240508-en
General
-
Target
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
-
Size
79KB
-
MD5
03fa3345a0d6c728787c9ccd5298cf7f
-
SHA1
be5064cfd8fa5b90f7a995db598e232a6c0360e9
-
SHA256
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e
-
SHA512
68a49c5ab631881bdc2a3ff91175ebb1fd6062b8a8532679e73f8ff928b2e85b55264ae61a72bf0a609b58dcced63c12daeb93b0cd50bf4f420cfb4af647d036
-
SSDEEP
1536:zvGqEadLracOQA8AkqUhMb2nuy5wgIP0CSJ+5y2B8GMGlZ5G:zvG8EGdqU7uy5w9WMy2N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 1008 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1048 cmd.exe 1048 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.execmd.exedescription pid process target process PID 2372 wrote to memory of 1048 2372 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 2372 wrote to memory of 1048 2372 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 2372 wrote to memory of 1048 2372 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 2372 wrote to memory of 1048 2372 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 1048 wrote to memory of 1008 1048 cmd.exe [email protected] PID 1048 wrote to memory of 1008 1048 cmd.exe [email protected] PID 1048 wrote to memory of 1008 1048 cmd.exe [email protected] PID 1048 wrote to memory of 1008 1048 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe"C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5f83907ea3387035448cde0accf79aa86
SHA1fdff648e6b78bffadb1c81d321cd50247e134f19
SHA2569caae2daa20b497279fe249579c52b8c326290ab5160676fa7936b2c6627c843
SHA5122a41cb282ac6a8b89d99c66dea0f82790088f0d1c4e4c1d987ede07dc69a7f3005500a3d8075b4321a1e2679744507516b6730832666f46341efbd9d77171ae3