Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:38
Behavioral task
behavioral1
Sample
ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe
Resource
win10v2004-20240802-en
General
-
Target
ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe
-
Size
8.0MB
-
MD5
58dc0db44c284b05feaf96de1db820b1
-
SHA1
e3b8b9865c37f523b1538a29e5b71bb86a531445
-
SHA256
ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a
-
SHA512
adf7b10af7fc70c9fcbe64522260ae8b1c919976a90de60dbe44561b5ec781b3a49a78e6b92ffd41052122afa923076589171262249fe7e4f9fd86235a4cd0dd
-
SSDEEP
196608:e3wbSRrLV1W903eV4QReMToEuGxgh858F0ibfUGMbEfgAB8knD5Cs:98jW+eGQEMTozGxu8C0ibfJJY0V
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 2096 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2096 1944 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 31 PID 1944 wrote to memory of 2096 1944 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 31 PID 1944 wrote to memory of 2096 1944 ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"2⤵
- Loads dropped DLL
PID:2096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5789df2a941f6533b2ef653597ba1b3bf
SHA1aed6899de2216ae9b8efb6dfd88d0f481062374f
SHA256f9393c8ec8cc631e63d210466785e93c5c7850144f804718b4135a39d8c346f3
SHA512bf1d8696440757223a16403746938a60e0d428200476ed1c8a16bd2b8bd272dca5587835cff8eceeaf188d4822bdaa67fbe0deb667ca84d24e02bc91eb2bf92b
-
Filesize
14KB
MD5618aaa529dd57821e76a208ad6edf5c6
SHA107f84b504007c0ff9c0bfe06f5d5242c14a04ec5
SHA256f3f95892fe3e5ea966ae0293af3edd80ab3d01ca1a7dba88bd0a0ea32fb63794
SHA512a458f413a09989b90757a80cf4db4803345521d9a30327d07a6ce5fc2aa353f52105f410da92cb6abae649cc79621f7ecb211789e2dc80ed838e0329c75d88aa
-
Filesize
17KB
MD5e16585428b6b6c029e81a5d3ca3587ce
SHA187b657056a021640e4083c8b9c9656d34dfcc05f
SHA256d7cf7d3610c36076c1081198b9bc4b9f4c40e5d125566230939acc5a30e77471
SHA5120d0cb714772de088b75697781cf17ff85f76c55facc38d2e46392f3be4db21088d837657ba33814b651595269c7b41ffab0e8073ecfac43073995c5c186f208c
-
Filesize
15KB
MD5bf82bb3ceac6991a9967ec14cdd3c737
SHA12216df3f7d26de88f1de7e61ffa5d33736ea83d6
SHA25615e8d33ffd593ed8af904ab7cb74cac9583994ce92f2c73cfcc92665dda12f52
SHA512ec9eb9f5f729e121c007acc4cc64ae7c70d42f71af8f55cef3836381ef96aeb9ced8550c55610a8d8cc792a34bf6496333d176ec049a9773d5ecc37644643682
-
Filesize
15KB
MD5754f89ec71d918749c5105a1d4afcf58
SHA1e3480b2f2f16e1ba1b7d7a0604261bcd9eb43138
SHA25671642e31dfcbcd90f858c37885c832902a5bcc9fc98f4b9c173f95f5a2aaeef7
SHA5121d50b250091dbced6aa45fd6300730853f5c93763cfcf092331387bdafd09f7bee529ff1aafe4e02b7f29783d67544e2e67058c717fc35ba8f50d59dc0425da3
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce
-
Filesize
1005KB
MD562154f65bfded069b7e96a6d8009d259
SHA10b5f124298a6332c5b86ae350449212783215724
SHA25640594f325e3876413301e39f0949f7b1f524cb0ebf12a3d6463e0ce10f4a7f22
SHA512b9b13498d8d6d92b7796208142ab4c99278accca0eeef03fb618a790a2927079082e5a5b816a2a16e71298e47892e5616b1030fa8e9ea1c561a1511c1c9c3330