Analysis
-
max time kernel
74s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
a4804517f3f145exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
a4804517f3f145exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
a4804517f3f145exeexeexeex.exe
-
Size
428KB
-
MD5
a4804517f3f145069d4a5ae70c41b7a9
-
SHA1
16ab79be87e4f9784a95bb8db6806ea9ac57d810
-
SHA256
9aa75dfc01ca5c56bd2dc49a62f891d65628b1e17492e943edcda0bc909a3bf7
-
SHA512
05171c39c4a983d4685ee711134aea81f33e7d262072745acd6e3c1fcf51390af965e891961a0df365ff99feb7366cc17768424353164eb1484c8f48f63da311
-
SSDEEP
12288:Z594+AcL4tBekiuKzErRoxFCbwUjKc0/7pbEobUv5ROGl:BL4tBekiuVrRk60RrAv5RD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 952 5081.tmp -
Executes dropped EXE 1 IoCs
pid Process 952 5081.tmp -
Loads dropped DLL 1 IoCs
pid Process 3032 a4804517f3f145exeexeexeex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 952 3032 a4804517f3f145exeexeexeex.exe 28 PID 3032 wrote to memory of 952 3032 a4804517f3f145exeexeexeex.exe 28 PID 3032 wrote to memory of 952 3032 a4804517f3f145exeexeexeex.exe 28 PID 3032 wrote to memory of 952 3032 a4804517f3f145exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4804517f3f145exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a4804517f3f145exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\5081.tmp"C:\Users\Admin\AppData\Local\Temp\5081.tmp" --helpC:\Users\Admin\AppData\Local\Temp\a4804517f3f145exeexeexeex.exe CEEE3CD32BBD0AE582B18AECAEBF817AB1331A4F2C411FBD77161A5C6121CE9F0F83D5A5633D6435F45CEFB462BD8573E019B7FC3B5760E190399733F884CAC02⤵
- Deletes itself
- Executes dropped EXE
PID:952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD507e461c137c60075532f0ff762214b37
SHA13f5f151d275e4144a98d57a4aeb5e7a1664ed867
SHA256b41b295b39a44fa0728158aad7c0586ce5bb8a044a877bd951b5897c840e4944
SHA51256bcbf59c46514aa0a605e9fe8a21b9eb5a3fa17465a5effc553c1f49c66100e941419d271f323e06ee4684f128a2978d9031b41873732092e424f406e566095
-
Filesize
428KB
MD507e461c137c60075532f0ff762214b37
SHA13f5f151d275e4144a98d57a4aeb5e7a1664ed867
SHA256b41b295b39a44fa0728158aad7c0586ce5bb8a044a877bd951b5897c840e4944
SHA51256bcbf59c46514aa0a605e9fe8a21b9eb5a3fa17465a5effc553c1f49c66100e941419d271f323e06ee4684f128a2978d9031b41873732092e424f406e566095