Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe
Resource
win11-20240419-en
General
-
Target
c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe
-
Size
14KB
-
MD5
042ab4c4eec2df899cfd3ffb7b61fd80
-
SHA1
a5e436a7df688f76a33372a26b30bd43fd99de65
-
SHA256
c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84
-
SHA512
711e6c77dffc91bca0aee6e5071daeb6c0a9fdd8a15d31afea4f16acae8c810022e6d78e2e17765df24176d4d57a161b9c59b82e405924746bf1e3bdc1fd100f
-
SSDEEP
192:uQPzI1i7Ws3/FP6amDVZGZd1qtgWAyMgaaP9h55yOoOpupaFwKKoIWlJdxqHbnzv:XTWsPFaDCsUSFAv0IWlJj+l
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1248 242607071411312.exe 1856 242607071426921.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3936 wrote to memory of 2936 3936 c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe 88 PID 3936 wrote to memory of 2936 3936 c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe 88 PID 2936 wrote to memory of 1248 2936 cmd.exe 89 PID 2936 wrote to memory of 1248 2936 cmd.exe 89 PID 1248 wrote to memory of 3676 1248 242607071411312.exe 90 PID 1248 wrote to memory of 3676 1248 242607071411312.exe 90 PID 3676 wrote to memory of 1856 3676 cmd.exe 91 PID 3676 wrote to memory of 1856 3676 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe"C:\Users\Admin\AppData\Local\Temp\c502f79254b5f43e74c3859651bfa31c36206359b760cd2c3ee709bccbca6c84.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071411312.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\242607071411312.exeC:\Users\Admin\AppData\Local\Temp\242607071411312.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071426921.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\242607071426921.exeC:\Users\Admin\AppData\Local\Temp\242607071426921.exe 0000025⤵
- Executes dropped EXE
PID:1856
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58d8bc1ffd70b13796b979241fdb9ab71
SHA101c662264cd94213cbca5cea0af3998ab172e20c
SHA25601dc72ff9863d92e9c8d960a3db69913b51aa4658858ae95cc69b17003c6de81
SHA512d9900ef99ca398859bfbcbfdf2e02569a285519aa8aeb77133e1c19c329fa1135f02de99af99aa38542db57ea93e77a5049575e6c0a34911da5191d8f3c287ec
-
Filesize
13KB
MD58cf5d9a20c43674e682f9a9f28ba6bb2
SHA149c88fbd829ad173d500112794cacf584a531125
SHA25603df001fcf857970430d750330cae61d40db09dc2fe4f3f742b575700f90a527
SHA512adfc0ad24918ce112ead7bd905168ed071a56dfb2358338a5eb35d33ef13d45f02776dce4457b6041e291d73b139105f1b5cb681723db26410940366f2f3ad73