Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
cb56ea529726c8399e6f7b8c54ed40e4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cb56ea529726c8399e6f7b8c54ed40e4.exe
Resource
win10v2004-20240508-en
General
-
Target
cb56ea529726c8399e6f7b8c54ed40e4.exe
-
Size
3.2MB
-
MD5
cb56ea529726c8399e6f7b8c54ed40e4
-
SHA1
fa79565ec772c51eaeced6769299113f32329a1e
-
SHA256
a67d5dd48c2279867a2600e76b51ab45586da46f199f636eec7f0963db4b1da0
-
SHA512
8c5f4345e8d3d89e7cda4ac0dcf11e785c96056f12066711b9c7efe0349e26e2bc2f954418515e2498aed275e8dfe7f1c701f651d0d0b6608322c9e3c43e8ac7
-
SSDEEP
49152:TBuZrEUeziKl5W9pnjJjzfMZF/F/iu1+49UOyanhEFbqUsMuGjsbjU:VkLeh5o5MZF/FX5UEhub8MuGgHU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 cb56ea529726c8399e6f7b8c54ed40e4.tmp -
Loads dropped DLL 2 IoCs
pid Process 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 1932 cb56ea529726c8399e6f7b8c54ed40e4.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1932 cb56ea529726c8399e6f7b8c54ed40e4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28 PID 2576 wrote to memory of 1932 2576 cb56ea529726c8399e6f7b8c54ed40e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb56ea529726c8399e6f7b8c54ed40e4.exe"C:\Users\Admin\AppData\Local\Temp\cb56ea529726c8399e6f7b8c54ed40e4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\is-MVPPI.tmp\cb56ea529726c8399e6f7b8c54ed40e4.tmp"C:\Users\Admin\AppData\Local\Temp\is-MVPPI.tmp\cb56ea529726c8399e6f7b8c54ed40e4.tmp" /SL5="$5014E,2260663,928256,C:\Users\Admin\AppData\Local\Temp\cb56ea529726c8399e6f7b8c54ed40e4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD513d9e8b03fb386938ba1fc7bec21d4d6
SHA15e9ac915547c3b0a792375e175c6021a434cde4d
SHA256593c77994b3efad2918c778efa28eae41cc3864068f27a87014578c66da5363b
SHA51272ce5c7b63d18a88c818d0b92e293883a0d40b022cd81e56bbc5f40e1ec18cdbcf8a6fd355ffe0013bc6df1d0ff8f48ee16c21719a728bdfd801a2e35276db56
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63