Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe
Resource
win10v2004-20240226-en
General
-
Target
10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe
-
Size
1.4MB
-
MD5
7852d19ca1efd7a26644980df3ba01d3
-
SHA1
18cfdd421415f819d833a10c994d8d3fc31ec484
-
SHA256
10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae
-
SHA512
f69f1ec58acab14a6bf4d122649422f694c1ed4c6a992f30da5b93a717efc50360d0cba737efa1f0529ea8e21a012c6e786156d1fedad57a7940aa886e71e14c
-
SSDEEP
24576:0Hyi0YRzZgx/jtTObFtURiRQkzRQD9ZkdxTu5iZpUHLQfRRNa:HIIhTObMbIItrya
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
notepad.exepid process 2644 notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2152 cmd.exe 2152 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.execmd.exedescription pid process target process PID 3004 wrote to memory of 1856 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 1856 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 1856 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2152 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2152 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2152 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2908 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2908 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 3004 wrote to memory of 2908 3004 10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe cmd.exe PID 2152 wrote to memory of 2644 2152 cmd.exe notepad.exe PID 2152 wrote to memory of 2644 2152 cmd.exe notepad.exe PID 2152 wrote to memory of 2644 2152 cmd.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe"C:\Users\Admin\AppData\Local\Temp\10d7c0e08d2f5ccaee9e722c965f65c8d4a9ac54b32c542bde29c017d76bc7ae.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /k start ÈÎìÇ-Öйú´«Ã½´óѧ.docx2⤵
-
C:\Windows\system32\cmd.execmd /c C:\Windows\Temp\notepad.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\notepad.exeC:\Windows\Temp\notepad.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.execmd /k del ÈÎìÇ-Öйú´«Ã½´óѧ.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\Temp\notepad.exeFilesize
831KB
MD5eaa16e9789f182de10c482e26b374304
SHA1b53763f592b24ff14b15e1662917c41722299957
SHA256281a624fcdf4a1c2593a44c436f3523550f31b66ff756f73f1d7e5ebf03d5717
SHA512c7b1d24b537b63a4ed786f4763dbf287e6c1d5233e36048433ca7ff235f4feeefb68b4ff1d5f7c6763e5993371540f8b6bb373c681bc7b193ba466b647e508e0
-
memory/1856-18-0x0000000001F50000-0x0000000001F51000-memory.dmpFilesize
4KB
-
memory/1856-26-0x0000000001F50000-0x0000000001F51000-memory.dmpFilesize
4KB
-
memory/2644-7-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/3004-2-0x0000000000400000-0x0000000000583000-memory.dmpFilesize
1.5MB