Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe
Resource
win10v2004-20240426-en
General
-
Target
638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe
-
Size
12KB
-
MD5
d9b8daefcbf130dc56ff6aad93eaf8fe
-
SHA1
a7fc5dff8460b447b6db9a9c1dda735dff9993c5
-
SHA256
638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790
-
SHA512
02049eb22f4aaed76928dde60babdae2557de2e0a1b99bca4fc421f3a11da587d02161e67f2ba87f658f8b73d43cbe58c6f70f2829b81520458fed6cf10a4183
-
SSDEEP
192:0lzT5Qna0mSj66Fuik/pzVE3+qkz61I7Uusokl3XrGBWlJdxqHXrOk:G30tGdwukqBWlJj+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
pid Process 1268 240603141649324.exe 6004 242603141652402.exe 3372 242603141701777.exe 4528 242603141710808.exe 5552 242603141720358.exe 5236 242603141729839.exe 1612 242603141739480.exe 5664 242603141748996.exe 1088 242603141758808.exe 4136 242603141809199.exe 3592 242603141818855.exe 6092 242603141828339.exe 1440 242603141837949.exe 3484 242603141847621.exe 2012 242603141857027.exe 2620 242603141906855.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1392 2808 638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe 87 PID 2808 wrote to memory of 1392 2808 638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe 87 PID 1392 wrote to memory of 1268 1392 cmd.exe 88 PID 1392 wrote to memory of 1268 1392 cmd.exe 88 PID 1268 wrote to memory of 5232 1268 240603141649324.exe 94 PID 1268 wrote to memory of 5232 1268 240603141649324.exe 94 PID 5232 wrote to memory of 6004 5232 cmd.exe 95 PID 5232 wrote to memory of 6004 5232 cmd.exe 95 PID 6004 wrote to memory of 4192 6004 242603141652402.exe 96 PID 6004 wrote to memory of 4192 6004 242603141652402.exe 96 PID 4192 wrote to memory of 3372 4192 cmd.exe 97 PID 4192 wrote to memory of 3372 4192 cmd.exe 97 PID 3372 wrote to memory of 3840 3372 242603141701777.exe 99 PID 3372 wrote to memory of 3840 3372 242603141701777.exe 99 PID 3840 wrote to memory of 4528 3840 cmd.exe 100 PID 3840 wrote to memory of 4528 3840 cmd.exe 100 PID 4528 wrote to memory of 6096 4528 242603141710808.exe 101 PID 4528 wrote to memory of 6096 4528 242603141710808.exe 101 PID 6096 wrote to memory of 5552 6096 cmd.exe 102 PID 6096 wrote to memory of 5552 6096 cmd.exe 102 PID 5552 wrote to memory of 2996 5552 242603141720358.exe 103 PID 5552 wrote to memory of 2996 5552 242603141720358.exe 103 PID 2996 wrote to memory of 5236 2996 cmd.exe 104 PID 2996 wrote to memory of 5236 2996 cmd.exe 104 PID 5236 wrote to memory of 2668 5236 242603141729839.exe 105 PID 5236 wrote to memory of 2668 5236 242603141729839.exe 105 PID 2668 wrote to memory of 1612 2668 cmd.exe 106 PID 2668 wrote to memory of 1612 2668 cmd.exe 106 PID 1612 wrote to memory of 2000 1612 242603141739480.exe 107 PID 1612 wrote to memory of 2000 1612 242603141739480.exe 107 PID 2000 wrote to memory of 5664 2000 cmd.exe 108 PID 2000 wrote to memory of 5664 2000 cmd.exe 108 PID 5664 wrote to memory of 5680 5664 242603141748996.exe 109 PID 5664 wrote to memory of 5680 5664 242603141748996.exe 109 PID 5680 wrote to memory of 1088 5680 cmd.exe 110 PID 5680 wrote to memory of 1088 5680 cmd.exe 110 PID 1088 wrote to memory of 4808 1088 242603141758808.exe 111 PID 1088 wrote to memory of 4808 1088 242603141758808.exe 111 PID 4808 wrote to memory of 4136 4808 cmd.exe 112 PID 4808 wrote to memory of 4136 4808 cmd.exe 112 PID 4136 wrote to memory of 4180 4136 242603141809199.exe 113 PID 4136 wrote to memory of 4180 4136 242603141809199.exe 113 PID 4180 wrote to memory of 3592 4180 cmd.exe 114 PID 4180 wrote to memory of 3592 4180 cmd.exe 114 PID 3592 wrote to memory of 4796 3592 242603141818855.exe 115 PID 3592 wrote to memory of 4796 3592 242603141818855.exe 115 PID 4796 wrote to memory of 6092 4796 cmd.exe 116 PID 4796 wrote to memory of 6092 4796 cmd.exe 116 PID 6092 wrote to memory of 5744 6092 242603141828339.exe 117 PID 6092 wrote to memory of 5744 6092 242603141828339.exe 117 PID 5744 wrote to memory of 1440 5744 cmd.exe 118 PID 5744 wrote to memory of 1440 5744 cmd.exe 118 PID 1440 wrote to memory of 1980 1440 242603141837949.exe 119 PID 1440 wrote to memory of 1980 1440 242603141837949.exe 119 PID 1980 wrote to memory of 3484 1980 cmd.exe 120 PID 1980 wrote to memory of 3484 1980 cmd.exe 120 PID 3484 wrote to memory of 3004 3484 242603141847621.exe 121 PID 3484 wrote to memory of 3004 3484 242603141847621.exe 121 PID 3004 wrote to memory of 2012 3004 cmd.exe 122 PID 3004 wrote to memory of 2012 3004 cmd.exe 122 PID 2012 wrote to memory of 3940 2012 242603141857027.exe 123 PID 2012 wrote to memory of 3940 2012 242603141857027.exe 123 PID 3940 wrote to memory of 2620 3940 cmd.exe 124 PID 3940 wrote to memory of 2620 3940 cmd.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe"C:\Users\Admin\AppData\Local\Temp\638ce0b45a403b5f702c23a1df44fe4740e4ed8beabc7c0bcad2215f448aa790.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240603141649324.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\240603141649324.exeC:\Users\Admin\AppData\Local\Temp\240603141649324.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141652402.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:5232 -
C:\Users\Admin\AppData\Local\Temp\242603141652402.exeC:\Users\Admin\AppData\Local\Temp\242603141652402.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141701777.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\242603141701777.exeC:\Users\Admin\AppData\Local\Temp\242603141701777.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141710808.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\242603141710808.exeC:\Users\Admin\AppData\Local\Temp\242603141710808.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141720358.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:6096 -
C:\Users\Admin\AppData\Local\Temp\242603141720358.exeC:\Users\Admin\AppData\Local\Temp\242603141720358.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141729839.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\242603141729839.exeC:\Users\Admin\AppData\Local\Temp\242603141729839.exe 00000613⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5236 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141739480.exe 00000714⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\242603141739480.exeC:\Users\Admin\AppData\Local\Temp\242603141739480.exe 00000715⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141748996.exe 00000816⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\242603141748996.exeC:\Users\Admin\AppData\Local\Temp\242603141748996.exe 00000817⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141758808.exe 00000918⤵
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\242603141758808.exeC:\Users\Admin\AppData\Local\Temp\242603141758808.exe 00000919⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141809199.exe 00000a20⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\242603141809199.exeC:\Users\Admin\AppData\Local\Temp\242603141809199.exe 00000a21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141818855.exe 00000b22⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\242603141818855.exeC:\Users\Admin\AppData\Local\Temp\242603141818855.exe 00000b23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141828339.exe 00000c24⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\242603141828339.exeC:\Users\Admin\AppData\Local\Temp\242603141828339.exe 00000c25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141837949.exe 00000d26⤵
- Suspicious use of WriteProcessMemory
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\242603141837949.exeC:\Users\Admin\AppData\Local\Temp\242603141837949.exe 00000d27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141847621.exe 00000e28⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\242603141847621.exeC:\Users\Admin\AppData\Local\Temp\242603141847621.exe 00000e29⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141857027.exe 00000f30⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\242603141857027.exeC:\Users\Admin\AppData\Local\Temp\242603141857027.exe 00000f31⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603141906855.exe 00001032⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\242603141906855.exeC:\Users\Admin\AppData\Local\Temp\242603141906855.exe 00001033⤵
- Executes dropped EXE
PID:2620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD59607669e0e554d15e110a4065deff150
SHA136cf1ccad79fac03ab3068243ab5104cc69a86f3
SHA25620bad66825ffa7e102ce534221b78d4cc993fca792d3fcb613db80ee25dfc9e9
SHA51248d17244d956305ab773d97523dc57e024715685d49f5685967f4e186c0fe43be1792bf567965d67a9442677d0ec30f4ec9559fab59820f2643bd84818f2bb00
-
Filesize
13KB
MD566cec024f3086cf6f628ebf720f37114
SHA13e0f0701ac79b73289323aed6a185f6b113b02df
SHA2562f48132d00b98a97ebe4848db9f4f063320b3029276bd77a5adfd172690bb01f
SHA512363c0037b5066826687d35b89ddb0889b983493a69468157ec80d81dcb3bf7286df0124c9480b2ae291308312f60133367fab9a408b42ce443003a19ac73da3e
-
Filesize
13KB
MD511041f38efd7b292c44655a373494500
SHA179a4deca7985093ab8ceed61c85d6b4b584e9ee0
SHA256a653ca072bc1e526ba3851d4305d4121121a3778cbb2b37656cbf6fc10c06353
SHA512850e28978093524acb9c86c7efb3abbfd985e3f0b08d91a6991a7decf27ecd46600eca6297846920ab01cba0e13ae9f943c4a58b542e2b4cd09307d76bd2239e
-
Filesize
13KB
MD520db0c36e18813afbfe4a8964773ed10
SHA14f71b6bedc213c20548b9e0043de4648b150f096
SHA2567698228fdb929db360745c4fd70292ba2498eb4eeef648ed40b3f829fb3abc62
SHA512fc133f8f48823e34c4e60f0c3763e8ee9ad49646e05e0f59ef27fbf180baa5d3458407dcbe8bb9e37a1a5ad11982094fd0f14f3c2750a6a0ae3cc9ed546fa988
-
Filesize
13KB
MD5362f655ce12c7c51742e6281f38ffe29
SHA170c290a445e989b2eb45e14186791d9c3a9c6a9d
SHA256fb9d6304467b59d01f259bb0c1e57a34727980661e15cff72e5cb92ab7a7666a
SHA5123869bcbcea823930ad877e877e566bfb835821d704e312ee9f3119b48b89727300f7f39ed0e9ee2039b7d4014b6e7bd9d25de7aa74aee65e698b4ff9c29f39d1
-
Filesize
13KB
MD59af0da8a4ec13f8165e757fc3d4bc192
SHA1337d7154f8d0e0c0d2d1043e0477938384ef9d8c
SHA2564b48c86dfe26abdae94fb86f53aef619e4a125126ccc65f7511632d8f82223f2
SHA512b7d2ee537a19752ba52f18e618b0b0a5a32f245a0c64a9a35552ee07a10cea5141b9f5f019fc0d3777e9b48b2addcda65c873039df356e24178c147ca3e2702e
-
Filesize
12KB
MD57b356c0d15bc7f2253a5ea20ea53ecf6
SHA1640fd4885a225cdfb0978d4688e66fa0ab16e2bb
SHA256ef67af6de80e3e9c00463a26340953fcd86980409720380f73c32ffce12044a5
SHA512965747bb712b872749abe9283b4c4df6c5b5eda84662715b064a6fe41311cc5a59faf32cbfba2d2129b4be72f554fc9be7c0b7849a60d77e302b0677c98cdc88
-
Filesize
13KB
MD5d66e9d8b8789c29b99356fb9818629dc
SHA1fae8b14ff35bdfd39e37069378d241af8f4e8d31
SHA25649859ac49a705b87c60897cb8d939de3fe1b5f00db6866aec240bb0abff85726
SHA512bf67e42094a02efb1a29ef635b25e8bd245804578fffc7ff1b0a5b832609065e04f9af3461dfd8df240f6031b239d454ef14e816b7d925add77342d28c361425
-
Filesize
13KB
MD5c0fea79e0ec85093df1ebc61b336a8e6
SHA1aede96b4b0de415540e5137e36881a9eba4326eb
SHA2566239194206f6b117874293d16431d4446deb47645755fffcf844f6db3e004f7a
SHA512eefffbce59b23ed5084eab255ef6de40bc017c9a4a7979cb6d4bfbb4ef2eb9004075e203fd133a4246dd5674a0f2327204651bd1d83a66859456717bd92c4cdf
-
Filesize
12KB
MD5c7a8f67950b1b5a023800f016ec41023
SHA1bfdba600be922bb4e2fce9c8991abd4581ea022a
SHA2562820c9b5872c8642d23613356553e4c1aa244614385181a695dc18c58c070b99
SHA5120c7b7531e8e4af85945c16415f0eeae178b08705b15d3cfd73b4bd8239afb85f1d5324bbbe0d7c019a385b77a545da55f3d17c4d9dc96b2d408e02982ce0d8f2
-
Filesize
13KB
MD5f91cba4cc616982bcc101f0d772c7297
SHA1caa7a450543934c16c826fc0360dce7563de04e6
SHA256c750e34758e8a96579310bbd45fa22b2df9149deb86832ac1abbcaaaf37dab6c
SHA5124976c0deaf181619d30a26c7e35d26e35a84d82005b61b06e66ced6ef9ac7d6a0e62593b0c4b324d5f09f0106d0f244052821a56fceee7e43092ba5645540e5a
-
Filesize
13KB
MD5612c011d75127a11357b8c0d948db019
SHA1d2191587841209302f993b56f20d1f980425a537
SHA2562e30e333e0c969d962b2bdac49b6cc3102a6aae0d45e74ae3c982794231e387e
SHA5123ed6111b2e0326814fad6a916eeea33f71e35b47c5871de2dca3382693411f72eae06bb09e5049a5d1a06deb88835f43d3d6e3a125c68e585ecdbe9f16a6cc89
-
Filesize
13KB
MD5bda2e7e0892b919e9e5c48c61e2151a2
SHA1fa123eed8da0169c289ddbd131287b46e0ee91f4
SHA256a9c0a54f4e1b6f298bb6fd67eb1cc23a942cc6c6a8be22f66345dcd5f4cd21e8
SHA512d397a7c196d192d62a8e9756ad48bdfe04b2f8fcf41d877a01946bcb85b094e72524a06df98e37ca49ea81613d3878967fdef4e90a414e8d5df73a39841cb9fb
-
Filesize
13KB
MD5241e1ca369ad7d30687fd4f561f8e485
SHA1fd94a871c3d8e8e62b2dfcb53be95e1b813bb5c4
SHA256258f95a4db177983ff9e83ddc639919040df0bb1605a1564fb72c38854c2562f
SHA5129a2079712321f88728bd0aa68bd9dea372927f7dd41f405ab6c7c1ffc4e559e003c6058ee51c2065eef8ceabaf9bf6ca32828aade378e404c2f69d2f458f5049
-
Filesize
12KB
MD5f7bc270266529ece83db8dd2792c6485
SHA171702640c4cea68615bcd8b6f337541abd8bed45
SHA256fc958027b8ad47683eac90ee30851376b239869008e79884ed6981289772348f
SHA512b78870f321ea6f25ea0df124740dbcd382fe6b30e67c6cc561b523f53ddfaa2ac8268463103a4515a766d0b11ba0cd3acbfcd84db8a120d3eac3ba021f91dab2
-
Filesize
12KB
MD576a4371bf12092bbcf41c91c9b37c27c
SHA1a125ba72fe3412fff3d2a5a377df04005b6082ed
SHA256ef533666c9744a1169f2b34469e1ea2459c4c35704fc98a8fa68c3a85d0a9558
SHA512b5cf19e167c38a4fc8539d77b2a751c6b7876a10c4e73b836ebf7b8a30a7f4824de2b369562c872a1756396454fc6db7cf7c6ca7b88d1d738aab5ada7b766650