Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe
Resource
win10v2004-20240508-en
General
-
Target
a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe
-
Size
79KB
-
MD5
0391917b3f2ed33866dc58dd81d93455
-
SHA1
9c3cf39bb37ecf8ec0dc3917b2a5b9040b3b7b37
-
SHA256
a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a
-
SHA512
7c745016bf8f9f167b5929d861a039306f89c65f0d9a68ee24d7e089801b0e5b8bce26235798737e21b8b87cc68143ef56a52a32ecdd9b3180a16e4bdcb8ec92
-
SSDEEP
1536:zvtWgNR4gnuf/mNv4OQA8AkqUhMb2nuy5wgIP0CSJ+5yyB8GMGlZ5G:zvtWgcBf+vdGdqU7uy5w9WMyyN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2088 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1352 cmd.exe 1352 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.execmd.exedescription pid process target process PID 640 wrote to memory of 1352 640 a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe cmd.exe PID 640 wrote to memory of 1352 640 a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe cmd.exe PID 640 wrote to memory of 1352 640 a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe cmd.exe PID 640 wrote to memory of 1352 640 a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe cmd.exe PID 1352 wrote to memory of 2088 1352 cmd.exe [email protected] PID 1352 wrote to memory of 2088 1352 cmd.exe [email protected] PID 1352 wrote to memory of 2088 1352 cmd.exe [email protected] PID 1352 wrote to memory of 2088 1352 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe"C:\Users\Admin\AppData\Local\Temp\a93d0e2d98229d730d40fc8d90d3f48be081cee9c2b5f3185f9ab6789cc7c30a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2088
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5749d2cb227f7dec331bc15568b7925a9
SHA180008261b02082c12f9bf3dc7b332e1d18f1f2f5
SHA25615dd6291f1fec336a96abc6cfd61ee4ddb7758b1a4bf0ebf90f1836ea76f69d4
SHA5124c7578db8816a4126e4fffb27caaf62a0c0715b74aa76b80ac62bcbebe28fdb0398e6225363c3fa443f287f1a07823ff6c249930ac81617738cd2ef7426974ef