Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe
Resource
win10v2004-20240508-en
General
-
Target
ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe
-
Size
79KB
-
MD5
12e0fbbbcb9a0ccf8fbff02e584065ae
-
SHA1
4df77d6747915ba37f382a6721dee2ef5cc8d3ae
-
SHA256
ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8
-
SHA512
0f7ff9e7cf4c9921d45ac8368972e9fc6ed1c633cfe535e6bbeca3ad8f60ca62bd45da5a49a4fd107779af9ae8fd131323421f39ecae1197831560169fd9b628
-
SSDEEP
1536:zvfPo/TxG+BDewZsOQA8AkqUhMb2nuy5wgIP0CSJ+5y2B8GMGlZ5G:zvnYA+iKZGdqU7uy5w9WMy2N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pid process 2280 [email protected] -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2908 cmd.exe 2908 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.execmd.exedescription pid process target process PID 2008 wrote to memory of 2908 2008 ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe cmd.exe PID 2008 wrote to memory of 2908 2008 ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe cmd.exe PID 2008 wrote to memory of 2908 2008 ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe cmd.exe PID 2008 wrote to memory of 2908 2008 ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe cmd.exe PID 2908 wrote to memory of 2280 2908 cmd.exe [email protected] PID 2908 wrote to memory of 2280 2908 cmd.exe [email protected] PID 2908 wrote to memory of 2280 2908 cmd.exe [email protected] PID 2908 wrote to memory of 2280 2908 cmd.exe [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe"C:\Users\Admin\AppData\Local\Temp\ac8a560ac25885dda9ed2e4fa1d70eacf9584bb7ccc41afee3379c670caf42f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2280
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD587824d1f9e6b6029da6668db66d1beb9
SHA192ee9f786d6af642deb9197b8c15548258844ac1
SHA2563b20462ef63b1d5e4b2c21239f2dbfebae8186c9dc1191d8c85582644efc17f7
SHA512dd815cd5254f7e233af539f66f73e707d5feead8eece2511f5f8b70b57314010391c294db90865fa99faf992ff6785147ee4cfb0b180efeb1f0e580f22206921