Analysis

  • max time kernel
    891s
  • max time network
    888s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 19:28

General

  • Target

    736647737_x64.exe

  • Size

    123KB

  • MD5

    3a9b61f06786317576833dcc6e74089a

  • SHA1

    4f4a0970b68cbeaa3589b55579749f2df5efc2ac

  • SHA256

    f4a0dd960a7e98d34d0432594aee9b76871533332199643163431398194f50f5

  • SHA512

    4ecc76f5f5719c5b833a1bb0286105372bf8b7088141cb48059b6b4358747e8c393c5a9cd6f16311a152dbd7fb13e55290a0b893cb9e4f4122f40e6900f4a375

  • SSDEEP

    1536:B1QgyknlJh0gH5tqdJ7OAnKVMHq6gsga/uZRfH1BggT75ThHG/Ay8IA4xfJW/OW:31yknfOgH5tsKQKiK6gvrkgJo/AiJAP

Score
10/10

Malware Config

Extracted

Family

warmcookie

C2

45.155.249.102

Attributes
  • mutex

    b2e53de1-aaa9-4d8d-b7ef-3f90146a5c6c

  • user_agent

    Mozilla / 4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR 1.0.3705)

Signatures

  • Warmcookie family
  • Warmcookie, Badspace

    Warmcookie aka Badspace is a backdoor written in C++.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\736647737_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\736647737_x64.exe"
    1⤵
    • Drops file in Windows directory
    PID:5172
  • C:\ProgramData\Spiralogics\Updater.exe
    C:\ProgramData\Spiralogics\Updater.exe /u
    1⤵
    • Executes dropped EXE
    PID:1044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Spiralogics\Updater.exe

    Filesize

    123KB

    MD5

    3a9b61f06786317576833dcc6e74089a

    SHA1

    4f4a0970b68cbeaa3589b55579749f2df5efc2ac

    SHA256

    f4a0dd960a7e98d34d0432594aee9b76871533332199643163431398194f50f5

    SHA512

    4ecc76f5f5719c5b833a1bb0286105372bf8b7088141cb48059b6b4358747e8c393c5a9cd6f16311a152dbd7fb13e55290a0b893cb9e4f4122f40e6900f4a375

  • memory/1044-5-0x00007FF777E00000-0x00007FF777E26000-memory.dmp

    Filesize

    152KB

  • memory/1044-18-0x00007FF777E00000-0x00007FF777E26000-memory.dmp

    Filesize

    152KB

  • memory/5172-0-0x00007FF7D87C0000-0x00007FF7D87E6000-memory.dmp

    Filesize

    152KB

  • memory/5172-3-0x00007FF7D87C0000-0x00007FF7D87E6000-memory.dmp

    Filesize

    152KB