Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 03:32
Behavioral task
behavioral1
Sample
e24b37be5e09fd76dcf9fe2fa81f71f0N.exe
Resource
win7-20240705-en
General
-
Target
e24b37be5e09fd76dcf9fe2fa81f71f0N.exe
-
Size
9.7MB
-
MD5
e24b37be5e09fd76dcf9fe2fa81f71f0
-
SHA1
6cccd35ed3746f4aa0325a05a7edfbccc9f44ed1
-
SHA256
e089897b04d5f0bf260f905eaefe54b9170d6bc6029cd33602193a53d13318f8
-
SHA512
93f2c644a016416ae986c4f8ceb5ef4bda46ba687a0b5aff5b7d4b144625db9bc5021bfb9ea17a8c5df474aec77f26b1f040b5e3e1e0f9f46355509c6d9243c0
-
SSDEEP
196608:RIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII8LLLLLLLLLLLLLLLLLLLLLL9:eLLLLLLLLLLLLLLLLLLLLLL9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 svrwsc.exe -
resource yara_rule behavioral1/memory/2504-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0009000000012281-4.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe e24b37be5e09fd76dcf9fe2fa81f71f0N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24b37be5e09fd76dcf9fe2fa81f71f0N.exe"C:\Users\Admin\AppData\Local\Temp\e24b37be5e09fd76dcf9fe2fa81f71f0N.exe"1⤵
- Drops file in System32 directory
PID:2504
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD5a9b0ef854dbe373da7371c8316a53b1a
SHA14e9891cb0f5470412393afea66f745e614658318
SHA2563377f83451ca990a8bcb20ddd181d887842b00cb42c484615553a953a7315ef8
SHA5129e519d6d90726946df4bc3e0cd69a2cbbd55531b4d7c28722e37769af8ecec3e1dac342839057ba9a268e7079d00058db1016d24dfe1eb2bdbc3e42117469199