Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe
Resource
win10v2004-20240508-en
General
-
Target
c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe
-
Size
156KB
-
MD5
e76296858d9fa720e190acbbd1fe7276
-
SHA1
3c4175dcb86d687ad4f1f43fa28e5d14af9a375a
-
SHA256
c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250
-
SHA512
55752f76f4bd77cff776a6bca8a8f5179e8595853932bffc153e0c89e97971ec88a0ecabff94596c419d650054bd26df31a822ba5ab01a9991be77ba43f612a0
-
SSDEEP
1536:9BoWdHaDLw7iJvu+gFEJah1B+ILaxr8XJWtvSLe4k9VUJ9HV8UtPfSZqQ3rcYtuS:AWdHaDfJvUiahO7xrUJ5gSvv9Fqv
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.execmd.exedescription pid process target process PID 1736 wrote to memory of 2088 1736 c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe cmd.exe PID 1736 wrote to memory of 2088 1736 c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe cmd.exe PID 1736 wrote to memory of 2088 1736 c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe cmd.exe PID 1736 wrote to memory of 2088 1736 c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe cmd.exe PID 2088 wrote to memory of 2860 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2860 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2860 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2860 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2316 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2316 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2316 2088 cmd.exe netsh.exe PID 2088 wrote to memory of 2316 2088 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe"C:\Users\Admin\AppData\Local\Temp\c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt07272.bat "C:\Users\Admin\AppData\Local\Temp\c0fb2edf68a50c8661996fc8d63b6b80b2799829efa0282ace2acf10f48fb250.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\netsh.exenetsh wlan set hostednetwork mode=allow ssid=H key=19283746dxf3⤵PID:2860
-
C:\Windows\SysWOW64\netsh.exenetsh wlan start hostednetwork3⤵PID:2316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bt07272.batFilesize
104B
MD50bcbc536d7d74d719cd926b7335de5b2
SHA1767d386fa577a333f7afbb4d0ef06d9483c71c4e
SHA256c3f204011a0f2d2fed5abf5dd422aa27d6990f0a0f9d5c1fc5981684f9450b75
SHA512e0ad559d604cce6bc5576bf35f8ed11a068d8460ce57cc87470129c09a6fd633b243ab3b48f4d60c6a6b5444c734b7bd1c3dfe2f5b849ee0a360c572a4be33e6
-
memory/1736-3-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB