Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
2eb1a17c7e88651447c5afe490bcac70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2eb1a17c7e88651447c5afe490bcac70N.exe
Resource
win10v2004-20240709-en
General
-
Target
2eb1a17c7e88651447c5afe490bcac70N.exe
-
Size
369KB
-
MD5
2eb1a17c7e88651447c5afe490bcac70
-
SHA1
e066463ffb7b9a3e3285b456814cdb5bbb2d703d
-
SHA256
ae646bcacb3e7ef79482b8ae554481a94fd2a027c542a7f1ef6ec2575da599f2
-
SHA512
33be918e38fd03a371cf4c3f98172c11b4f3a95a4e938bbb1dcfe5eedf4f9a71cf4dd23dd25751140834aff88e10537791874645ff6bfa007932da735757859e
-
SSDEEP
3072:3j9PjK7mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmz:35PjQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 svrwsc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 2eb1a17c7e88651447c5afe490bcac70N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb1a17c7e88651447c5afe490bcac70N.exe"C:\Users\Admin\AppData\Local\Temp\2eb1a17c7e88651447c5afe490bcac70N.exe"1⤵
- Drops file in System32 directory
PID:2992
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2084
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5b3652c218c2efd3f9502ab125782e12a
SHA1c61ddc75e1a779f0786ffa98396ea923ff9590c7
SHA256ba8359f47afdfa20f801fec3b006b53135f5eab5f9f9d91f924882be8388bbd7
SHA5121d1f6887f98b470f450d880eaa81fcf795e6ff49713ec2cdacdffdc65392755c68afb5f7871245df3bcc24b464ead60a0f734172ce421c074c56bb0bd6d3316c