Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe
Resource
win11-20240508-en
General
-
Target
942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe
-
Size
13KB
-
MD5
118c5c74296b5dc915a9f102ce2b6ee3
-
SHA1
8e3c7a41844490fec358895a73996404d49162cb
-
SHA256
942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722
-
SHA512
5a27c8d0460941e14189dfbb9e6e697681eb8dfac5f75a06b09f20af470a98667b2858c2d1cac60f62006d919abf5be911467115551a46de70fb56fbe392cc74
-
SSDEEP
192:SnbI1yM+H12AH26WByZWSi7gffuZgTPxPkpFsURbKN3+iS1UWlJdxqHC31x/:WXfH12WUgNPdlvMUWlJj+U
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4488 242607064231247.exe 1912 242607064244841.exe 3124 242607064300278.exe 5048 242607064321497.exe 3296 242607064342356.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4980 wrote to memory of 864 4980 942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe 82 PID 4980 wrote to memory of 864 4980 942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe 82 PID 864 wrote to memory of 4488 864 cmd.exe 83 PID 864 wrote to memory of 4488 864 cmd.exe 83 PID 4488 wrote to memory of 2856 4488 242607064231247.exe 84 PID 4488 wrote to memory of 2856 4488 242607064231247.exe 84 PID 2856 wrote to memory of 1912 2856 cmd.exe 85 PID 2856 wrote to memory of 1912 2856 cmd.exe 85 PID 1912 wrote to memory of 3288 1912 242607064244841.exe 86 PID 1912 wrote to memory of 3288 1912 242607064244841.exe 86 PID 3288 wrote to memory of 3124 3288 cmd.exe 87 PID 3288 wrote to memory of 3124 3288 cmd.exe 87 PID 3124 wrote to memory of 4864 3124 242607064300278.exe 88 PID 3124 wrote to memory of 4864 3124 242607064300278.exe 88 PID 4864 wrote to memory of 5048 4864 cmd.exe 89 PID 4864 wrote to memory of 5048 4864 cmd.exe 89 PID 5048 wrote to memory of 3676 5048 242607064321497.exe 90 PID 5048 wrote to memory of 3676 5048 242607064321497.exe 90 PID 3676 wrote to memory of 3296 3676 cmd.exe 91 PID 3676 wrote to memory of 3296 3676 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe"C:\Users\Admin\AppData\Local\Temp\942d73842f7e852243f1b6bfb95f66a9cdb3372c7e95d8562ad94a1ab9a59722.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607064231247.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\242607064231247.exeC:\Users\Admin\AppData\Local\Temp\242607064231247.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607064244841.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\242607064244841.exeC:\Users\Admin\AppData\Local\Temp\242607064244841.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607064300278.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\242607064300278.exeC:\Users\Admin\AppData\Local\Temp\242607064300278.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607064321497.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\242607064321497.exeC:\Users\Admin\AppData\Local\Temp\242607064321497.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607064342356.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\242607064342356.exeC:\Users\Admin\AppData\Local\Temp\242607064342356.exe 00000511⤵
- Executes dropped EXE
PID:3296
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5c0084d6449647315963d2551b0c7b30b
SHA10fcd4f3dcfc0abee3c333e187b6520829b8c38da
SHA256c8e302fefc023437da17633323d85d5c6897b76cbcecaea22ffaa3251eb41afb
SHA512d8d0f31b44fa973fa1ac7d3e29aa1ecc336e3a26da9d24277ebcd9a6a8b46fd86952b5968788b7f99b88470ff4256a7e7d3d1bdefa21d4767ccccba81c7c6388
-
Filesize
13KB
MD5c396024feb2ae0db0cee7040c3a1e14a
SHA1a32b2e3249ff29d12d9ec72473de1580ba3661f3
SHA256188f4bdd40bd38ab0993ae60ead486a8055f345aab2f9af3d58d06f9a86c938e
SHA5128ae6b4efe2e6d2520cc335451ce3cd587f07af123746d6b16f7ff2d31967e8913f35a0b27442e0c48c1f7b714c249831d1ba09da84e82af2902d9fc6c0474fb4
-
Filesize
13KB
MD5c3df85273a8685f7b30040085e7bb1f6
SHA1698bfc8a525179686bbd15a612557c72dfb89e3e
SHA25622b40027b425e2303f53013dc7bb51ab8f082d2b8ad6715482f1761ce376bcfa
SHA51228c3f2deef3960b993b570b1b849d9cc177b84c4494abb8446e78af3554f6ba39c886549c81c1ecde8d491e26541b44ee5ecede94ec88693bc89f6d8268cc451
-
Filesize
13KB
MD5eaeea5ad5f81a8ff50dc70f19e5cbb6f
SHA11803afcff2355ba6c08b680586edbd8db59636ea
SHA25635d264027994858eca22880021c5a5de41b018a84778789b4b985f82a8a49b54
SHA512d16ce465208293ff166ca98018685641d6a58379eb78a7993864e96aa80125a1011a8d266182a7d294e436efd9e7e8bd8a8b013e2b51219c40171daaf96c36d0
-
Filesize
14KB
MD5589020f35d4044966df9d14ed7d5282f
SHA1f8f99ce4ad9793ead2b97ab48797bde394b6d387
SHA2567baf59b547cfba4ecf4119e178a457dfe59bac20a6ba2fef779672ef459ac7ba
SHA512e8b3b99f4ff5dade11fc1877ca133c8dd15ac0e8e66e9c72ba108c3a6c51640be54d91d237cd48c47ecfafc4bce95db5223febabe6b8b3aac3bf07bd849520ad