Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 03:30
Behavioral task
behavioral1
Sample
539031cea66c4fcba449b9ec128f09c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
539031cea66c4fcba449b9ec128f09c0N.exe
Resource
win10v2004-20240704-en
General
-
Target
539031cea66c4fcba449b9ec128f09c0N.exe
-
Size
9.2MB
-
MD5
539031cea66c4fcba449b9ec128f09c0
-
SHA1
771c74f686112c7f52be87a5d1ae96070b2381a3
-
SHA256
dfd0fc2eca82c5d3d6af3d81b80e25455999306251e8e079fdbbd29966cd3057
-
SHA512
efee2882b600f54b140257a2c8498815ee14a90c9df8763d694f90e94043e6c86b659905620e41bd90596035579802edb9b09b731dd265b97f376d4463044deb
-
SSDEEP
196608:saaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaP:saaaaaaaaaaaaaaaaaaaaaaaaaaaaaak
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5044 svrwsc.exe -
resource yara_rule behavioral2/memory/4800-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/files/0x000700000002325a-5.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 539031cea66c4fcba449b9ec128f09c0N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\539031cea66c4fcba449b9ec128f09c0N.exe"C:\Users\Admin\AppData\Local\Temp\539031cea66c4fcba449b9ec128f09c0N.exe"1⤵
- Drops file in System32 directory
PID:4800
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD57a5f317502ca3a2828d47cf5849a0b35
SHA196fd01c459b1095118b58e2cd51a385514b86336
SHA2567a32b6c57925578afcf0ddbd77d6d36ff2bb4192b86a7f69b6cacfe395d4552f
SHA51272bc5d75047739ebce46c09e753ed60fea1a113c21a16510ed146969b6842967189f3c13de8ae1e11f4de60f4cc41aa8ef24931a5862f3da9937e92443a9b9c2