Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe
Resource
win10v2004-20240426-en
General
-
Target
97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe
-
Size
12KB
-
MD5
f6610c44ddb14f057e51eb7e6eccc9b6
-
SHA1
f9ddcd7abe31fedb0d4bf7c49e763ae2a3e1bcbf
-
SHA256
97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b
-
SHA512
d440aa5498f3a2d22bc06718fa39591d88d89d973df8031f20140a3ea4492e7570dc247d0024081828651a38b109a0a83b69953d8a9cab4303382ef74e831354
-
SSDEEP
192:olIT53So0tSV96ZuknYhcgfLaP8UVBN5kO18kGGGWlJdxqHivo:FZ7nVE3tjCITGWlJj+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 4976 240603140658318.exe 3608 242603140708505.exe 448 242603140719443.exe 1188 242603140729896.exe 3432 242603140739208.exe 3400 242603140749411.exe 2092 242603140759193.exe 1804 242603140809818.exe 5016 242603140819943.exe 2900 242603140830927.exe 2392 242603140840630.exe 2988 242603140850739.exe 3084 242603140900193.exe 4448 242603140909052.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 4280 wrote to memory of 2320 4280 97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe 92 PID 4280 wrote to memory of 2320 4280 97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe 92 PID 2320 wrote to memory of 4976 2320 cmd.exe 93 PID 2320 wrote to memory of 4976 2320 cmd.exe 93 PID 4976 wrote to memory of 2880 4976 240603140658318.exe 94 PID 4976 wrote to memory of 2880 4976 240603140658318.exe 94 PID 2880 wrote to memory of 3608 2880 cmd.exe 95 PID 2880 wrote to memory of 3608 2880 cmd.exe 95 PID 3608 wrote to memory of 4692 3608 242603140708505.exe 97 PID 3608 wrote to memory of 4692 3608 242603140708505.exe 97 PID 4692 wrote to memory of 448 4692 cmd.exe 98 PID 4692 wrote to memory of 448 4692 cmd.exe 98 PID 448 wrote to memory of 2044 448 242603140719443.exe 99 PID 448 wrote to memory of 2044 448 242603140719443.exe 99 PID 2044 wrote to memory of 1188 2044 cmd.exe 100 PID 2044 wrote to memory of 1188 2044 cmd.exe 100 PID 1188 wrote to memory of 3824 1188 242603140729896.exe 101 PID 1188 wrote to memory of 3824 1188 242603140729896.exe 101 PID 3824 wrote to memory of 3432 3824 cmd.exe 102 PID 3824 wrote to memory of 3432 3824 cmd.exe 102 PID 3432 wrote to memory of 2264 3432 242603140739208.exe 103 PID 3432 wrote to memory of 2264 3432 242603140739208.exe 103 PID 2264 wrote to memory of 3400 2264 cmd.exe 104 PID 2264 wrote to memory of 3400 2264 cmd.exe 104 PID 3400 wrote to memory of 3652 3400 242603140749411.exe 105 PID 3400 wrote to memory of 3652 3400 242603140749411.exe 105 PID 3652 wrote to memory of 2092 3652 cmd.exe 106 PID 3652 wrote to memory of 2092 3652 cmd.exe 106 PID 2092 wrote to memory of 1492 2092 242603140759193.exe 107 PID 2092 wrote to memory of 1492 2092 242603140759193.exe 107 PID 1492 wrote to memory of 1804 1492 cmd.exe 108 PID 1492 wrote to memory of 1804 1492 cmd.exe 108 PID 1804 wrote to memory of 1500 1804 242603140809818.exe 109 PID 1804 wrote to memory of 1500 1804 242603140809818.exe 109 PID 1500 wrote to memory of 5016 1500 cmd.exe 110 PID 1500 wrote to memory of 5016 1500 cmd.exe 110 PID 5016 wrote to memory of 2616 5016 242603140819943.exe 111 PID 5016 wrote to memory of 2616 5016 242603140819943.exe 111 PID 2616 wrote to memory of 2900 2616 cmd.exe 112 PID 2616 wrote to memory of 2900 2616 cmd.exe 112 PID 2900 wrote to memory of 1952 2900 242603140830927.exe 113 PID 2900 wrote to memory of 1952 2900 242603140830927.exe 113 PID 1952 wrote to memory of 2392 1952 cmd.exe 114 PID 1952 wrote to memory of 2392 1952 cmd.exe 114 PID 2392 wrote to memory of 808 2392 242603140840630.exe 115 PID 2392 wrote to memory of 808 2392 242603140840630.exe 115 PID 808 wrote to memory of 2988 808 cmd.exe 116 PID 808 wrote to memory of 2988 808 cmd.exe 116 PID 2988 wrote to memory of 4312 2988 242603140850739.exe 117 PID 2988 wrote to memory of 4312 2988 242603140850739.exe 117 PID 4312 wrote to memory of 3084 4312 cmd.exe 118 PID 4312 wrote to memory of 3084 4312 cmd.exe 118 PID 3084 wrote to memory of 2540 3084 242603140900193.exe 119 PID 3084 wrote to memory of 2540 3084 242603140900193.exe 119 PID 2540 wrote to memory of 4448 2540 cmd.exe 120 PID 2540 wrote to memory of 4448 2540 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe"C:\Users\Admin\AppData\Local\Temp\97c4dc97b02054162091ba2cfe35ad0118a996153a685e61c63f876d5fd5db2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240603140658318.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\240603140658318.exeC:\Users\Admin\AppData\Local\Temp\240603140658318.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140708505.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\242603140708505.exeC:\Users\Admin\AppData\Local\Temp\242603140708505.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140719443.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\242603140719443.exeC:\Users\Admin\AppData\Local\Temp\242603140719443.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140729896.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\242603140729896.exeC:\Users\Admin\AppData\Local\Temp\242603140729896.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140739208.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\242603140739208.exeC:\Users\Admin\AppData\Local\Temp\242603140739208.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140749411.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\242603140749411.exeC:\Users\Admin\AppData\Local\Temp\242603140749411.exe 00000613⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140759193.exe 00000714⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\242603140759193.exeC:\Users\Admin\AppData\Local\Temp\242603140759193.exe 00000715⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140809818.exe 00000816⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\242603140809818.exeC:\Users\Admin\AppData\Local\Temp\242603140809818.exe 00000817⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140819943.exe 00000918⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\242603140819943.exeC:\Users\Admin\AppData\Local\Temp\242603140819943.exe 00000919⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140830927.exe 00000a20⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\242603140830927.exeC:\Users\Admin\AppData\Local\Temp\242603140830927.exe 00000a21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140840630.exe 00000b22⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\242603140840630.exeC:\Users\Admin\AppData\Local\Temp\242603140840630.exe 00000b23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140850739.exe 00000c24⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\242603140850739.exeC:\Users\Admin\AppData\Local\Temp\242603140850739.exe 00000c25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140900193.exe 00000d26⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\242603140900193.exeC:\Users\Admin\AppData\Local\Temp\242603140900193.exe 00000d27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603140909052.exe 00000e28⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\242603140909052.exeC:\Users\Admin\AppData\Local\Temp\242603140909052.exe 00000e29⤵
- Executes dropped EXE
PID:4448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50be5ef8a7e51e359fb60e1fcfb76d366
SHA1836ae8bd1eeeab0b5f0b91a3a9e1a1f61aadcfd4
SHA256ca14651db1252c0253761d4fa8819c05c966aafc04c1ecf77ab31c6e26e3f72f
SHA51276b55f65e1b74d33965c1778d8c4a9a076eee855eccda8eda9707de5bda97baefb76288ed09c07f3a8c9c616207e6a07edcd0f0c6f3847f03a4e45852d52dee9
-
Filesize
12KB
MD570cabe2f4290dc453e9a867bad5613e8
SHA11917ac4ca9ea4cd23b42dac5cfcbb7002b4f643e
SHA256a6c89a383c367a965faf31c68940eae7a9c6227fb3023c5923dab89fa0d214b0
SHA5120d0dbc8906f7ceb7abdcf194bd8c9677c269d5a12e99cb2dc92213f3972439810e5a13b289ec7b056cf2286bf4dfb9a2b99625b138dda0d031de79c457759246
-
Filesize
12KB
MD57c53978459856a6abe2c8c049500d312
SHA1a4a7b062d23c35ca3ce17ecdb4a668d5f218f215
SHA25601ce3fd4f1c1d79f4365cdfb49654f52529bacca3fb4edb3b0aed198353dec3a
SHA5121f95a619f3da553d088b455ccc3235fc1b7b65717b48b7d6819cb52ace41aca835f5c54e069a101a92c0a695440a1283d628527bb11358845537d14d6e316b2c
-
Filesize
12KB
MD51eb92ab58af499c9ae349a20b9762de9
SHA1396269dd29faa22218ebc13493456908f7947a0f
SHA256789ce890d340c1a842c0a542ef18e4c6641086a60f7523acb4ae46e002d2ee8e
SHA512ff8e3dd2e45b035587813c653d7d6b0f7b01c4fcbb9a3cd58b11f8bb615e9266053fda2157040c853b9b99449fadd8afdfa5a181ae338b01ab34a9ddfbda190f
-
Filesize
13KB
MD5b5f55e9e0c4808c3818b11977b606daa
SHA1da0cf32040c36753d60e551a38afb03e799842db
SHA256c648df1b684d59eacad2d3ed22137b3d96a33b85fcd63a67b4969d866207ff4f
SHA512af51b9d35757480acde6d7f716f4413d0c0f9b6647950fdbec779ca7a064d1fc204d419984e825f77adeaaf14286a514ec7bb2eda2f508a454e99c433bffb3fa
-
Filesize
12KB
MD53894ec6104f38b8f0a2819e473c6487c
SHA1592e67010275c9782a3b9c9e0491ec814a3e2b5b
SHA25661b70e60796ac6adb7a4f5c7dd2e698d9e2f57df7c2fab5c28adef678492e6bd
SHA5120d7fb2137264d2d00b72ec83270fce6726b9df2987b553436f8cf370840569287dd33bd02b48997cb38ad7531b510fbf1b7a18d1d682a7b7f1ed489c33b2fd03
-
Filesize
12KB
MD550b81763058102968c1ff7ca32efbdba
SHA1877046ebd93f1ed52714e7dd06889b077660fba9
SHA256ea4d7d7cecc4f1633c37c62137c150c45a3251866a0808e1bd577d9ce08b4fb9
SHA5127a896bfbafa6932e7dcc326d4a717d43439c6a935ee2f9f39c9806259eb0a93b86b13cf41f53409d5cdad59a170e88b6e64472993869300d689b640b1fe5478d
-
Filesize
12KB
MD50dfe4ff7aae61e842b952e6c4e36f51f
SHA18359a2bfc944d400255c84eb626bf2873b09f70f
SHA25694f17da7325921e22775f11f8edf3dea635ea98bf42937707ad4dab10cedf076
SHA512054dd5333fe21e33f1742a4f5f9109cbdda1dc45dab0a919080f8b39fe138b9c987c028ea833b9a316cbc2d3d7e5c2d2637556085301ff3c2836ca54cd8194b6
-
Filesize
12KB
MD5f53aa9de1facc0c88986de3b24f8c225
SHA15eb4fcfb58368947815cb88a85443f868c1f8811
SHA2569f09821c780f95089f490f671da03ea95c7e7d8f25e8b78c779b5289114333eb
SHA5122927927aa84c85c9571c3d1dcceb19a9c0e0afe833ec71efde080e17944c6871810bcf8257a3c931efb4586eb00fa8395cdd13b55a58a226468600daad579833
-
Filesize
12KB
MD56cc86fe7f61568185bda9b6c5f4c013a
SHA13b913836cdbee392b62636ce3cd8b999d4742f6f
SHA256f1196859939983fb1898d278e8ec9cbe2dc95495cc92bb427082f3b2705fbc1f
SHA5128edd525715a52685942e08effcbe0e90e13b1ea98bea0f87a7826a290c74b3e927a386ed19e0d6f391fff5fb882540180ca9d7c18eec78c19008f57b23a2c75a
-
Filesize
13KB
MD5322326e4de04ef1b8b4b076cdf3abe17
SHA184c392c714f999b2dc670dbba4a6b3b9ebf9db0b
SHA2569ab68472c899e3e18e61ed01c80ef80f97b1f388d1c1df573e1ec1aaf0ff6118
SHA512eeda64d0f66f652922702332ebca517a1a34ed0b65f73fec97a9e2fc4ba013dd9bdcb1cbd153422cae9d538fad69603773f8d0287b87d2d220122c89f83b6fb7
-
Filesize
12KB
MD5e9f18fe57fb6e7badcaecfdcd86d4d30
SHA14a2b6330689d8c6174fa8678658d7ce77371ab10
SHA2569aa02aeeb49237e6fea87d3b36712e2a3973d2a391cbcfff83e530cfa12e4610
SHA512f82ac0223d6a9c352c3df908a7f6ab3f2c71219efe0a161d3b4c22443cb9a5f61af4ec94c7d15b1145361e28113ed204b3ca7e187f0fbafec46b6ed9846679cd
-
Filesize
12KB
MD5cabe2ba57e9b59c757054dc74449abea
SHA1a3ea1e35c1680c702f27b7304f2f12d61abc2ca1
SHA256b77b247799501ef21e9968123f756934a074df55f6df6d128360bd2f0c9dc3d3
SHA51240da1ad279112bbfe1687a2150b45ca2e28862d253a93f5394f4c3313f6c5d0e5ab6ab5f4507c56394f2b64112b0757cd26631157f6202ed0d0044137dc8d06b
-
Filesize
12KB
MD5896c07352f991799483bba1e1f895016
SHA17a4ca260f5b4f48887d0158d472cf7c2351f8645
SHA256d279c9a905bb7a86bcf4663707294ad46688fc5352b7897b68fbca6cb4a74de3
SHA5123fc7695441517dbaadbc331aa36c302dca22c0075e8d6324f9934e7bb2b5e302300d40edd74951a0b4b7cc836609850d488d79587a0b86755281ea22de17a7ea