Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe
Resource
win10v2004-20240508-en
General
-
Target
c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe
-
Size
1.4MB
-
MD5
501421bcb0f4bc8d1fe5dcaeb47cbc77
-
SHA1
76ec9e0c013f4c37bf59b21c29eecbd4edae8e24
-
SHA256
c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964
-
SHA512
e6d524137caf4b9ad384141d63e5140127c91d42c68801ebced474465505a38dbead7f6cc5edcb705b5bb2cf0473c1b828aa2596bf54daa21ec7df82902388a0
-
SSDEEP
24576:0Hyi0YRzZgx/jtTObFtURiRQkzRQD9ZkdxTu5iZpUHLQfRRNi:HIIhTObMbIItryi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
notepad.exepid process 3020 notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2340 cmd.exe 2340 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.execmd.exedescription pid process target process PID 2396 wrote to memory of 2416 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2416 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2416 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2340 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2340 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2340 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2876 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2876 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2396 wrote to memory of 2876 2396 c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe cmd.exe PID 2340 wrote to memory of 3020 2340 cmd.exe notepad.exe PID 2340 wrote to memory of 3020 2340 cmd.exe notepad.exe PID 2340 wrote to memory of 3020 2340 cmd.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe"C:\Users\Admin\AppData\Local\Temp\c1c212c43955c7e2ec5467c6a1eb5e875ad660eddb728019caa261b03c3ab964.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /k start ÈÎìÇ-Öйú´«Ã½´óѧ.docx2⤵
-
C:\Windows\system32\cmd.execmd /c C:\Windows\Temp\notepad.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\notepad.exeC:\Windows\Temp\notepad.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.execmd /k del ÈÎìÇ-Öйú´«Ã½´óѧ.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\Temp\notepad.exeFilesize
831KB
MD5eaa16e9789f182de10c482e26b374304
SHA1b53763f592b24ff14b15e1662917c41722299957
SHA256281a624fcdf4a1c2593a44c436f3523550f31b66ff756f73f1d7e5ebf03d5717
SHA512c7b1d24b537b63a4ed786f4763dbf287e6c1d5233e36048433ca7ff235f4feeefb68b4ff1d5f7c6763e5993371540f8b6bb373c681bc7b193ba466b647e508e0
-
memory/2396-2-0x0000000000400000-0x0000000000583000-memory.dmpFilesize
1.5MB
-
memory/2416-18-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2416-26-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/3020-12-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB