Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe
Resource
win10v2004-20240426-en
General
-
Target
9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe
-
Size
13KB
-
MD5
e8556af51af3f96c089f10e23aaf44e6
-
SHA1
3d494d35a5a1e9f645ef97342302cd27d36e6917
-
SHA256
9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305
-
SHA512
df83066e221ab0ee466132821148967bd770b049556aabc9a0f8496b6bca2984eb2efe19ce57f4c50441cfd98a6fe733b63b483187bb62db0fb4dee521369211
-
SSDEEP
192:lKqI1fBiyKjm6pMA4fMefWdsXGaZPB7C+YWcMja8WgCHdLWlJdxqHXYruAf1x:riipoGaKqW9hWlJj+Q
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1848 242604145307283.exe 4320 242604145318377.exe 2216 242604145330142.exe 368 242604145350580.exe 1924 242604145409299.exe 3224 242604145423002.exe 5072 242604145434095.exe 2652 242604145447611.exe 4796 242604145456986.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4408 3912 9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe 97 PID 3912 wrote to memory of 4408 3912 9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe 97 PID 4408 wrote to memory of 1848 4408 cmd.exe 98 PID 4408 wrote to memory of 1848 4408 cmd.exe 98 PID 1848 wrote to memory of 3836 1848 242604145307283.exe 99 PID 1848 wrote to memory of 3836 1848 242604145307283.exe 99 PID 3836 wrote to memory of 4320 3836 cmd.exe 100 PID 3836 wrote to memory of 4320 3836 cmd.exe 100 PID 4320 wrote to memory of 316 4320 242604145318377.exe 102 PID 4320 wrote to memory of 316 4320 242604145318377.exe 102 PID 316 wrote to memory of 2216 316 cmd.exe 103 PID 316 wrote to memory of 2216 316 cmd.exe 103 PID 2216 wrote to memory of 2784 2216 242604145330142.exe 104 PID 2216 wrote to memory of 2784 2216 242604145330142.exe 104 PID 2784 wrote to memory of 368 2784 cmd.exe 105 PID 2784 wrote to memory of 368 2784 cmd.exe 105 PID 368 wrote to memory of 1188 368 242604145350580.exe 106 PID 368 wrote to memory of 1188 368 242604145350580.exe 106 PID 1188 wrote to memory of 1924 1188 cmd.exe 107 PID 1188 wrote to memory of 1924 1188 cmd.exe 107 PID 1924 wrote to memory of 888 1924 242604145409299.exe 108 PID 1924 wrote to memory of 888 1924 242604145409299.exe 108 PID 888 wrote to memory of 3224 888 cmd.exe 109 PID 888 wrote to memory of 3224 888 cmd.exe 109 PID 3224 wrote to memory of 3120 3224 242604145423002.exe 110 PID 3224 wrote to memory of 3120 3224 242604145423002.exe 110 PID 3120 wrote to memory of 5072 3120 cmd.exe 111 PID 3120 wrote to memory of 5072 3120 cmd.exe 111 PID 5072 wrote to memory of 4224 5072 242604145434095.exe 112 PID 5072 wrote to memory of 4224 5072 242604145434095.exe 112 PID 4224 wrote to memory of 2652 4224 cmd.exe 113 PID 4224 wrote to memory of 2652 4224 cmd.exe 113 PID 2652 wrote to memory of 3764 2652 242604145447611.exe 114 PID 2652 wrote to memory of 3764 2652 242604145447611.exe 114 PID 3764 wrote to memory of 4796 3764 cmd.exe 115 PID 3764 wrote to memory of 4796 3764 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe"C:\Users\Admin\AppData\Local\Temp\9571c5d7802cf03f83955038ee04c292cf4875c94153223ba1c635e3a74a1305.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145307283.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\242604145307283.exeC:\Users\Admin\AppData\Local\Temp\242604145307283.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145318377.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\242604145318377.exeC:\Users\Admin\AppData\Local\Temp\242604145318377.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145330142.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\242604145330142.exeC:\Users\Admin\AppData\Local\Temp\242604145330142.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145350580.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\242604145350580.exeC:\Users\Admin\AppData\Local\Temp\242604145350580.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145409299.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\242604145409299.exeC:\Users\Admin\AppData\Local\Temp\242604145409299.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145423002.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\242604145423002.exeC:\Users\Admin\AppData\Local\Temp\242604145423002.exe 00000613⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145434095.exe 00000714⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\242604145434095.exeC:\Users\Admin\AppData\Local\Temp\242604145434095.exe 00000715⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145447611.exe 00000816⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\242604145447611.exeC:\Users\Admin\AppData\Local\Temp\242604145447611.exe 00000817⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242604145456986.exe 00000918⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\242604145456986.exeC:\Users\Admin\AppData\Local\Temp\242604145456986.exe 00000919⤵
- Executes dropped EXE
PID:4796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD510b78d854aeb6fbae7e181290155278c
SHA197c2005866391a0e330abe6e6db20c734fd89ad0
SHA25646217256948420377e69d2b7b81a84a96db8fba2d644e4fc3457f28c8ffccfb5
SHA5127bde7a44317bfbbd7ffaf8514d9dd58dd3fd592d00813cc300832eed2cae9359b41c7f856a743e2ee7cc6ecf40440531fe33511f90fc5b7f7032214764c87f2e
-
Filesize
13KB
MD56f7490764b34817448b497f837de2c0c
SHA129f891bcee49d8d66eeb30e8ffa3aa44c5626e02
SHA2561e71169c963c5c66abf8ad48898ca714006d18e450f99aeabbe22a8158d9f809
SHA5128a8d0cfb32ea7badeae8f5eba352640b430707d40f4221a66a747f50901e38b01c432eb513dc13061439eae05dffae0987745db02e6154d62896eddd8fcd4d58
-
Filesize
13KB
MD5df06590a6e6a690c77b2adc1023a18af
SHA127b043e2b4f54d14e83ba378d07415b8b75b485d
SHA25685ff17ab3b8da83963fa1aea0d6eef401bc2646cf9c8e55c88df873f7bacb4d5
SHA512cd8832c5f3685a9b645d5a6403a68beec6948fdc614de05c2ea5e870820c8c4f3356eb9d3a4a890b021ecb42d188d6c19e91b8c898999828fb0f96b42059e7b7
-
Filesize
12KB
MD5909715d61dbec2ba087df311a8371e17
SHA10625cf1a3ce0cf3a0c93c787f2f5a90bc9e0c865
SHA2568c06162cfc7a3fcb506d510e91639d31c02f54b932776996930a71e7532979e7
SHA5129207910136251e6bfcb8d74a32f72725ed3e2eadcb380099f11142ab9b70185e173503405263a28b7b05a8473b3aee35a20cd6f81f324fbac3cd93edadc51045
-
Filesize
13KB
MD5e503dd20bc331e7c7ed563161185347e
SHA19e6144cb99dffa5af63668418280e8e0d848e66c
SHA2560621c0f37a1719bc30d47e524cea30dd473062dda49129c10edc86af4347073c
SHA512728a58dcfbb86dd3b406f279663d255dfbd3b0298df8a573c0d336a0e37b7f9276f9f669255b18fc55b359b678d514a26030c1c7a5c28acee746883a0624a2a1
-
Filesize
12KB
MD5a347c23e092641ead41664a007de4540
SHA15cae85bffaf3c5cb035c04948dc985fbae0bcd22
SHA256c7defa90c60a6dc41cb4e559f818601f2af7b7132cb81a38c71c52e4ab832067
SHA51274a299b14b6822ee5374d6e01a1e7c0dd816a694c722a9a73af3b4765548eca3b63928f3ea8cf259e31eb8bbcd02d325695ef396e4f5da2f7c4a99ddf104c130
-
Filesize
12KB
MD55d615cac16c061659450d7584c0986cd
SHA1bf94c21816dbf36a766221170d89295764940948
SHA2567e0bda80a878bad3e50fa61670fea13639101a8bea4157ed50b44ec881915ecf
SHA5128efa4d6f807617e10511ed0fb8def7ad1016f20f057fb4dda748e0cd0145938251c50889dbc6570bf3772d605a754806aa2cbfe68926e586cd4362d5f54657b1
-
Filesize
13KB
MD558eb20dc2912c82445ac02b23f54b8a1
SHA1fb2462de073cfc5aeb09ac17dc2ded943c245e36
SHA2567ee49affc07059689fc6a48dc47432f7864f81e655ae1914c6f287742ebd4266
SHA512709d2c00afb9736569c96002c3060d817713479f04f889bec920adade5c7952f870033590976b558527ff28f62cb4422bb3c84ffb37d7cc33a6087b36b5a4d51
-
Filesize
12KB
MD54fbe54ebf4fed2f18ad7171f94920eee
SHA1d44423e9c40a4a90cd7fb1860aa0620fe2598d39
SHA25605de5dda648a3ac37977bfac70e1a08a3ece6527f6b9a48caf922f8394397abf
SHA512fce5e11da19e27673bc1fb8d858f23f128529531dce78cd441d1d5a0889707bc05e7a5a78d50bfba25167385f495c31e1956b8624b523610532c3b0e741cdf16