Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2024 05:25

General

  • Target

    c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe

  • Size

    1.4MB

  • MD5

    501421bcb0f4bc8d1fe5dcaeb47cbc77

  • SHA1

    76ec9e0c013f4c37bf59b21c29eecbd4edae8e24

  • SHA256

    c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964

  • SHA512

    e6d524137caf4b9ad384141d63e5140127c91d42c68801ebced474465505a38dbead7f6cc5edcb705b5bb2cf0473c1b828aa2596bf54daa21ec7df82902388a0

  • SSDEEP

    24576:0Hyi0YRzZgx/jtTObFtURiRQkzRQD9ZkdxTu5iZpUHLQfRRNi:HIIhTObMbIItryi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe
    "C:\Users\Admin\AppData\Local\Temp\c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\system32\cmd.exe
      cmd /k start ÈÎìÇ-Öйú´«Ã½´óѧ.docx
      2⤵
        PID:2416
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Windows\Temp\notepad.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\Temp\notepad.exe
          C:\Windows\Temp\notepad.exe
          3⤵
          • Executes dropped EXE
          PID:3020
      • C:\Windows\system32\cmd.exe
        cmd /k del ÈÎìÇ-Öйú´«Ã½´óѧ.exe
        2⤵
          PID:2876

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Windows\Temp\notepad.exe
        Filesize

        831KB

        MD5

        eaa16e9789f182de10c482e26b374304

        SHA1

        b53763f592b24ff14b15e1662917c41722299957

        SHA256

        281a624fcdf4a1c2593a44c436f3523550f31b66ff756f73f1d7e5ebf03d5717

        SHA512

        c7b1d24b537b63a4ed786f4763dbf287e6c1d5233e36048433ca7ff235f4feeefb68b4ff1d5f7c6763e5993371540f8b6bb373c681bc7b193ba466b647e508e0

      • memory/2396-2-0x0000000000400000-0x0000000000583000-memory.dmp
        Filesize

        1.5MB

      • memory/2416-18-0x0000000000190000-0x0000000000191000-memory.dmp
        Filesize

        4KB

      • memory/2416-26-0x0000000000190000-0x0000000000191000-memory.dmp
        Filesize

        4KB

      • memory/3020-12-0x0000000000400000-0x00000000004D8000-memory.dmp
        Filesize

        864KB