Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 11:12
Behavioral task
behavioral1
Sample
c94d2b9a2c1d6eb15412ade390183da0N.exe
Resource
win7-20240903-en
General
-
Target
c94d2b9a2c1d6eb15412ade390183da0N.exe
-
Size
6.1MB
-
MD5
c94d2b9a2c1d6eb15412ade390183da0
-
SHA1
eb2796ac39c47df3582231607918a27697b0b4a2
-
SHA256
d9e64fce1e55e91b4e0024da4d37294170a55dc3d83a69c05ed0f9ccaa2a1c0d
-
SHA512
444036d744c9775e588f6f8e5633e477ec1101c39f32ec12f07d5a99592496c84818d2e07ce5d30468c2f3e6a3bea0e4df6e963ed1abd43cf53a99c6db28bd10
-
SSDEEP
196608:VsssssssssssssssssssssssssssssssssssssssssssdNNNNNNNNNNNNNNNNNNj:Vssssssssssssssssssssssssssssssu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 svrwsc.exe -
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000012117-4.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe File created C:\Windows\SysWOW64\svrwsc.exe c94d2b9a2c1d6eb15412ade390183da0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94d2b9a2c1d6eb15412ade390183da0N.exe"C:\Users\Admin\AppData\Local\Temp\c94d2b9a2c1d6eb15412ade390183da0N.exe"1⤵
- Drops file in System32 directory
PID:2524
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2536
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5b0a281a39603cab3fd86900fb6e5c373
SHA17352a7c15ac6f25f00122cc40584426e13944b01
SHA256d58bb72d5e0740f233277d858c8d749b0274294e248b6a5672ab881ecd5c6c6a
SHA5128a00e8d3dac17148f5a3fdf2a31c0989e54f53a9532ec730111e1c164c0098e656556f82426642c5bee26a416a49f3d59a956bc66a4d09ce924a75e8812af4af