Analysis
-
max time kernel
108s -
max time network
111s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-06-2024 07:13
Static task
static1
Behavioral task
behavioral1
Sample
1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe
Resource
win11-20240426-en
General
-
Target
1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe
-
Size
12KB
-
MD5
d44c59c2489ea52a3a58a2b88293abe4
-
SHA1
19ae382f79a556ab191f6a99abaecf9ed10ee5a2
-
SHA256
1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce
-
SHA512
1966aa3548efca56d5b22f171ee01fcd8d0d691b31f6dd7eb9a428bbb7dbc74c2ba5449aba8fdc220d607f034c0a4f0130bbf011077d907166278e3923a49439
-
SSDEEP
192:9aLI16T8GITcN6BORFKvftUs8bf3v8LPfVSJYNaG+WlJdxqHS1x:+sGIoXsq8hlX+WlJj+A
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3100 242607071314372.exe 736 242607071327669.exe 3092 242607071342419.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2872 5000 1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe 79 PID 5000 wrote to memory of 2872 5000 1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe 79 PID 2872 wrote to memory of 3100 2872 cmd.exe 80 PID 2872 wrote to memory of 3100 2872 cmd.exe 80 PID 3100 wrote to memory of 3744 3100 242607071314372.exe 81 PID 3100 wrote to memory of 3744 3100 242607071314372.exe 81 PID 3744 wrote to memory of 736 3744 cmd.exe 82 PID 3744 wrote to memory of 736 3744 cmd.exe 82 PID 736 wrote to memory of 3088 736 242607071327669.exe 83 PID 736 wrote to memory of 3088 736 242607071327669.exe 83 PID 3088 wrote to memory of 3092 3088 cmd.exe 84 PID 3088 wrote to memory of 3092 3088 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe"C:\Users\Admin\AppData\Local\Temp\1725b7e784a6fa6b0b58caeb70ae8dc0f4acd7d10b2bf302ad231073a87b1bce.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071314372.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\242607071314372.exeC:\Users\Admin\AppData\Local\Temp\242607071314372.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071327669.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\242607071327669.exeC:\Users\Admin\AppData\Local\Temp\242607071327669.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071342419.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\242607071342419.exeC:\Users\Admin\AppData\Local\Temp\242607071342419.exe 0000037⤵
- Executes dropped EXE
PID:3092
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD57f7dd5dd3fd764abe7b8ea521d77b831
SHA11970013557018155a8bd2873fd5ff84747c455bf
SHA25617d5d4c26869599da71a63dbcc92af88e0173c78660351daaf33fcfe6a1f9749
SHA512663493c477768e4df259bece9f40ea9189d7b0aacd2c455cc4e8832fadea05e2c474a7c306c9b92b3d7581e241e0f080c03ad963e3d26d72b30a8a996ffaf8b1
-
Filesize
13KB
MD50b869671a82bc6b3ffe59cba8106c86d
SHA1d79441aa92fffd9cc1b3eb29c49ecfbc42d88aba
SHA256b6aa401abf38cc2477e0e10be68fb54ea71ea99049099d642661a9e2a8d43d05
SHA51267445aa2165d703b46e66430b23303adf2fb3cf035d65471e143462bcc5189541bd2bcf7592c2ba6cb34292d3586356e11aceb84b220664cfd114656532f505d
-
Filesize
12KB
MD529079ad2ee82ee628acd4af795f67f58
SHA18b4608bd66b2cac4686d612f12ef2f35825c0305
SHA2566c05a2cad4fa4ee71fc10bdcc73c24acc412d0201733a299ed4f4906ba90031f
SHA51219d2125e2cd664332f657b4e379103c91303123bafdff8c493964ce80cb287fdff5fbdd8a11c7f4f0c8c8f7a4a0ed9d18b0478913adc2900ed931b1105e66820