Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20240802-en
General
-
Target
loader.exe
-
Size
5.5MB
-
MD5
78dd0e7a959aac2a6af0cb31361b2c84
-
SHA1
07369dee73448ee2ddfebc19a3070d5692040293
-
SHA256
e50e90f46e6dcee26d97c765868d77ba85044cda01b3f59964e54c6f27f305e4
-
SHA512
4e6c33eeb555e0300e65de262b1ac7ab24ce2ddbe405303d9bb8fc617063a8e10a6898385661bbc093d6f4c8a8143c9cd95d2ae3dc7fdd8563caa06880b47b19
-
SSDEEP
98304:vV2G1vYdxU+adNBtrnVBkkP9GEtmW9VmwEgC7XlSAGorBHrFUkeq2smElSGhPW:vAGVYdyZdNLnPkkPTVycAGUhrmY2AMQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1544 TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4364 loader.exe 4364 loader.exe 1544 TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exe 1544 TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4020 4364 loader.exe 83 PID 4364 wrote to memory of 4020 4364 loader.exe 83 PID 4364 wrote to memory of 2700 4364 loader.exe 84 PID 4364 wrote to memory of 2700 4364 loader.exe 84 PID 2700 wrote to memory of 1544 2700 cmd.exe 85 PID 2700 wrote to memory of 1544 2700 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exeC:\Users\Admin\AppData\Local\Temp\TycB1G9tk3wHEuIxU0cBX13tVtYOG2.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD53825bdbc7f77b372bdc41e717793b77d
SHA13a9929033d65545d7d7d6d6ddf72b4179206471b
SHA256bf2307323a1a7baec9786c707443999a1a811acf4f280a09b53eb8c7c0c8ef49
SHA512bf3e7dbf88dd275ad034b3f9071979f88f292ec9b0417d01fb1d87caa41f6efa018534ad1b74a579c50fbb0de7eba9121abdef3b6cab867877578ef051e47724