Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
Resource
win10v2004-20240508-en
General
-
Target
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
-
Size
73KB
-
MD5
0a7ba0112facdf2ad3e2027174ccc72e
-
SHA1
67c14df9705bfc54c23c3f987ad06c0d98cd0f7d
-
SHA256
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83
-
SHA512
281c69f69fbab832ee994a432a2f91523620e04631bbf4f5fe46d1c35442567374679daac954ceb138cb4a06924a0962032c7cab857789ba78dad966cf2cf652
-
SSDEEP
1536:hbcxh+teG+ohHrmgK5QPqfhVWbdsmA+RjPFLC+e5hqQ0ZGUGf2g:haho7MgNPqfcxA+HFshvOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 3012 cmd.exe 3012 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3012 2916 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 29 PID 2916 wrote to memory of 3012 2916 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 29 PID 2916 wrote to memory of 3012 2916 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 29 PID 2916 wrote to memory of 3012 2916 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 29 PID 3012 wrote to memory of 3028 3012 cmd.exe 30 PID 3012 wrote to memory of 3028 3012 cmd.exe 30 PID 3012 wrote to memory of 3028 3012 cmd.exe 30 PID 3012 wrote to memory of 3028 3012 cmd.exe 30 PID 3028 wrote to memory of 2476 3028 [email protected] 31 PID 3028 wrote to memory of 2476 3028 [email protected] 31 PID 3028 wrote to memory of 2476 3028 [email protected] 31 PID 3028 wrote to memory of 2476 3028 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe"C:\Users\Admin\AppData\Local\Temp\d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2476
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD516f9e73c38112bc69c0a16e79f55bdbf
SHA15456b9330ffc317529be1ee6a2c3903b944d49f1
SHA2560a136f8bb4ba75f543fd81aa3cd571a6f485a8f6962b01dbd53b43a6a74e25ad
SHA512e30a9eaa03c1d57a5e8c88c0a3b6b3eca18855d65f02662c18227c197d83a89d1e367b229c718719f8aa2e0540c72c2fd11ccbf7e106c15e282bb8c09dc0bc63