Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe
Resource
win10v2004-20240508-en
General
-
Target
8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe
-
Size
79KB
-
MD5
1a58b55033787948d10adf05464db46f
-
SHA1
2034c1d715d8f65bb328f34ea35dc0553fb384ff
-
SHA256
8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef
-
SHA512
7a689a443a625e2229d1c26136e021a9a12fbad2db4e835788d3f8ef16c2f76b269d94e2b72c1b0115b4e72c4d997bd1e71508accf67e10bbd389ed1e53ff771
-
SSDEEP
1536:zvO/iWQN7sVqtRZuuOQA8AkqUhMb2nuy5wgIP0CSJ+5yeB8GMGlZ5G:zvO6LP7Z+GdqU7uy5w9WMyeN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 1492 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2596 cmd.exe 2596 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.execmd.exedescription pid process target process PID 1848 wrote to memory of 2596 1848 8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe cmd.exe PID 1848 wrote to memory of 2596 1848 8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe cmd.exe PID 1848 wrote to memory of 2596 1848 8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe cmd.exe PID 1848 wrote to memory of 2596 1848 8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe cmd.exe PID 2596 wrote to memory of 1492 2596 cmd.exe [email protected] PID 2596 wrote to memory of 1492 2596 cmd.exe [email protected] PID 2596 wrote to memory of 1492 2596 cmd.exe [email protected] PID 2596 wrote to memory of 1492 2596 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe"C:\Users\Admin\AppData\Local\Temp\8e64f37b7f77c2001ee68842c0bd89c7a60fbd200d3ebd6624cbb8bd944f9eef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1492
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5cb00fe17daea5bcd636afa5c3143734d
SHA1a6e9ca3ee933f3c014ff090260e82781ed05b661
SHA25694be5161d23b2048ea7b6bc762f6f4e15c6d29d6b4cb0ff9100aeafe5101bd9b
SHA512a7ca55b8ed231b8324c3c4184c49f0d4281727d1c62a9ca2e49fc36624a0de3ba48cff75981d2849ce997d89c55991f09896b32cceb4ed7e27c65cebd009d1f5