Analysis
-
max time kernel
142s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
03936e1d5952729c0c6bac3c200739cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
03936e1d5952729c0c6bac3c200739cc.exe
Resource
win10v2004-20230220-en
General
-
Target
03936e1d5952729c0c6bac3c200739cc.exe
-
Size
15.0MB
-
MD5
03936e1d5952729c0c6bac3c200739cc
-
SHA1
d9eb8ad31e1d74f1b2bad2b664e8c632b1a246d6
-
SHA256
9b4c9c84d6ddc0ef3a817f2b7ea0a126297ccfbaf459f8014da7231523e9a27f
-
SHA512
cb74ce18c6e607abbf68b00c4831df4544154cc550fbaa98efc4bdf732fbafec23827f9e54a0fc53ee2472e611cdfe8f3636d4e5ca72256571d190ec29117605
-
SSDEEP
393216:3i5ceG7XLCPa18feHZSr7EdKTjxjj2hU0OcA:3veoLU3ryQhj90Ox
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 03936e1d5952729c0c6bac3c200739cc.tmp -
Loads dropped DLL 1 IoCs
pid Process 1992 03936e1d5952729c0c6bac3c200739cc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 03936e1d5952729c0c6bac3c200739cc.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27 PID 1992 wrote to memory of 2032 1992 03936e1d5952729c0c6bac3c200739cc.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\03936e1d5952729c0c6bac3c200739cc.exe"C:\Users\Admin\AppData\Local\Temp\03936e1d5952729c0c6bac3c200739cc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\is-44KLQ.tmp\03936e1d5952729c0c6bac3c200739cc.tmp"C:\Users\Admin\AppData\Local\Temp\is-44KLQ.tmp\03936e1d5952729c0c6bac3c200739cc.tmp" /SL5="$70126,14888405,831488,C:\Users\Admin\AppData\Local\Temp\03936e1d5952729c0c6bac3c200739cc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5915c6e21d5f0843d745b13d99107af5a
SHA1a657b78527f416f1e81c055cf70016748bf44dda
SHA256461338f8cef5aed887758e1667bd50c1b3f37a1250f9587e561faf048142822b
SHA512b9492cd7d507f9f4816c03702b1e24ac33a803e9a4f0e1f659e7c6af38d1e40e608efe864bca469830ead3da3c5a45ed49afd8cc9f211d1978f3482a63591707
-
Filesize
3.0MB
MD5915c6e21d5f0843d745b13d99107af5a
SHA1a657b78527f416f1e81c055cf70016748bf44dda
SHA256461338f8cef5aed887758e1667bd50c1b3f37a1250f9587e561faf048142822b
SHA512b9492cd7d507f9f4816c03702b1e24ac33a803e9a4f0e1f659e7c6af38d1e40e608efe864bca469830ead3da3c5a45ed49afd8cc9f211d1978f3482a63591707