Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
Resource
win10v2004-20240508-en
General
-
Target
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe
-
Size
73KB
-
MD5
0a7ba0112facdf2ad3e2027174ccc72e
-
SHA1
67c14df9705bfc54c23c3f987ad06c0d98cd0f7d
-
SHA256
d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83
-
SHA512
281c69f69fbab832ee994a432a2f91523620e04631bbf4f5fe46d1c35442567374679daac954ceb138cb4a06924a0962032c7cab857789ba78dad966cf2cf652
-
SSDEEP
1536:hbcxh+teG+ohHrmgK5QPqfhVWbdsmA+RjPFLC+e5hqQ0ZGUGf2g:haho7MgNPqfcxA+HFshvOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4032 3108 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 83 PID 3108 wrote to memory of 4032 3108 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 83 PID 3108 wrote to memory of 4032 3108 d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe 83 PID 4032 wrote to memory of 2420 4032 cmd.exe 84 PID 4032 wrote to memory of 2420 4032 cmd.exe 84 PID 4032 wrote to memory of 2420 4032 cmd.exe 84 PID 2420 wrote to memory of 4704 2420 [email protected] 85 PID 2420 wrote to memory of 4704 2420 [email protected] 85 PID 2420 wrote to memory of 4704 2420 [email protected] 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe"C:\Users\Admin\AppData\Local\Temp\d72cb9002f5c529c5085b58243ab5ab25a8777e36cf78bc8b3c4a8e82e201b83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.exePID:4032
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4704
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD516f9e73c38112bc69c0a16e79f55bdbf
SHA15456b9330ffc317529be1ee6a2c3903b944d49f1
SHA2560a136f8bb4ba75f543fd81aa3cd571a6f485a8f6962b01dbd53b43a6a74e25ad
SHA512e30a9eaa03c1d57a5e8c88c0a3b6b3eca18855d65f02662c18227c197d83a89d1e367b229c718719f8aa2e0540c72c2fd11ccbf7e106c15e282bb8c09dc0bc63
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1