Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe
Resource
win10v2004-20240508-en
General
-
Target
30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe
-
Size
79KB
-
MD5
c9b53381bfa346e9632cfa375409fa20
-
SHA1
1be8f4075da8c6e2b59d00b230c4bb9a226335e5
-
SHA256
30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13
-
SHA512
ff27779b9acb60cc729cd9e2e28bd2857e1317f19d7a7156e30f9009cd1547b5e57f71baa137000e621a8a586cffabfe4498d0d7cf8f5571178b8563a496cf3a
-
SSDEEP
1536:zvLL///iH7AtfIrRjOQA8AkqUhMb2nuy5wgIP0CSJ+5y7B8GMGlZ5G:zvf///iH7+fUQGdqU7uy5w9WMy7N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3760 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3976 1628 30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe 81 PID 1628 wrote to memory of 3976 1628 30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe 81 PID 1628 wrote to memory of 3976 1628 30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe 81 PID 3976 wrote to memory of 3760 3976 cmd.exe 82 PID 3976 wrote to memory of 3760 3976 cmd.exe 82 PID 3976 wrote to memory of 3760 3976 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe"C:\Users\Admin\AppData\Local\Temp\30583de35140ba9415ba1351d27b61d98991cc7a73fe3fa4fc4bd77becf8dc13.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exePID:3976
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3760
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d0b9ff5aff5590b1e6812be00827a9c9
SHA14de127b60aba44c97b2f0f1cf258d7fca1a93cf9
SHA25680023e65f906452a23a91a150efe8668ebd69b266e73a72cbc5264bfb87f560b
SHA5120e786cff2cb4cde717908bb18ad6e42989f21bbb25ac3639a5087f8e11aa234a54c23886b28f9bbc93280597e45a20b2ee844b3215a8ace1732bf546940d975e