Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
8a749ad6cc24044609a49b3a69784470N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a749ad6cc24044609a49b3a69784470N.exe
Resource
win10v2004-20240802-en
General
-
Target
8a749ad6cc24044609a49b3a69784470N.exe
-
Size
252KB
-
MD5
8a749ad6cc24044609a49b3a69784470
-
SHA1
1e1a339d9cbc5a2e785c17470164fd415e9e29fc
-
SHA256
18fb2d7ba1f651bdc605ef4b514a6146b68cae91a5b17f1f4cbc802ca43af8ff
-
SHA512
be12a95e5c41cca93d3c479fa196164a9503460d172bb202838385db626f02ba8c98c31d1789784c1f993c195e48d255c19553cd893a1a4397d58fed892da058
-
SSDEEP
3072:fjjPqKhfmfmfmfmfmfmfmfmfmfmfmfmfmfmfmfmfmfmfmfl:fHPqc+++++++++++++++++++d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 svrwsc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 8a749ad6cc24044609a49b3a69784470N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a749ad6cc24044609a49b3a69784470N.exe"C:\Users\Admin\AppData\Local\Temp\8a749ad6cc24044609a49b3a69784470N.exe"1⤵
- Drops file in System32 directory
PID:2732
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD5b697d579d1d5a2fda4c5d5d43303adbb
SHA133f6d5d5c1cafc2af627d1cf496ad07e1f501ef9
SHA25603fb3c56d140d60369e75c7a91d191e5ad559147f89c7aa67e9e5c98873d5b42
SHA512516a953858a05e7acd9b7e1eb27c2071703b426537920223d13e5a7acbe0f9583da913b53d845c549722cdd96e185ba70314aac8b41d527675ddc3432a8d4232