Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
Resource
win10v2004-20240508-en
General
-
Target
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
-
Size
79KB
-
MD5
03fa3345a0d6c728787c9ccd5298cf7f
-
SHA1
be5064cfd8fa5b90f7a995db598e232a6c0360e9
-
SHA256
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e
-
SHA512
68a49c5ab631881bdc2a3ff91175ebb1fd6062b8a8532679e73f8ff928b2e85b55264ae61a72bf0a609b58dcced63c12daeb93b0cd50bf4f420cfb4af647d036
-
SSDEEP
1536:zvGqEadLracOQA8AkqUhMb2nuy5wgIP0CSJ+5y2B8GMGlZ5G:zvG8EGdqU7uy5w9WMy2N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 1800 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.execmd.exedescription pid process target process PID 1700 wrote to memory of 2628 1700 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 1700 wrote to memory of 2628 1700 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 1700 wrote to memory of 2628 1700 9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe cmd.exe PID 2628 wrote to memory of 1800 2628 cmd.exe [email protected] PID 2628 wrote to memory of 1800 2628 cmd.exe [email protected] PID 2628 wrote to memory of 1800 2628 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe"C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]Filesize
79KB
MD5f83907ea3387035448cde0accf79aa86
SHA1fdff648e6b78bffadb1c81d321cd50247e134f19
SHA2569caae2daa20b497279fe249579c52b8c326290ab5160676fa7936b2c6627c843
SHA5122a41cb282ac6a8b89d99c66dea0f82790088f0d1c4e4c1d987ede07dc69a7f3005500a3d8075b4321a1e2679744507516b6730832666f46341efbd9d77171ae3
-
memory/1700-6-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1800-5-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB