Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/07/2023, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
15968d8c85120cexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
15968d8c85120cexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
15968d8c85120cexe_JC.exe
-
Size
414KB
-
MD5
15968d8c85120c632304d185dba1eee9
-
SHA1
63086c36b40dc0a5e9fbefc74df43715289c308d
-
SHA256
68379bb80ab3d26dc43d27f2d51d16b3363011fd521a242b0302cba70f7cbe10
-
SHA512
2044b83f22c2d856abe4a24c813959bece3542e1766611e20f1fe0bb92a39199ae219dd20817788ec61b826f9175965b01b2f518ed9d61ec8e04f3f97ec3c94e
-
SSDEEP
12288:Wq4w/ekieZgU6sCucG1X7D3bu2OxGmGM/5Lelx:Wq4w/ekieH6s1jrby2ZU5Ler
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2072 79B2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2072 79B2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2964 15968d8c85120cexe_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2072 2964 15968d8c85120cexe_JC.exe 28 PID 2964 wrote to memory of 2072 2964 15968d8c85120cexe_JC.exe 28 PID 2964 wrote to memory of 2072 2964 15968d8c85120cexe_JC.exe 28 PID 2964 wrote to memory of 2072 2964 15968d8c85120cexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\79B2.tmp"C:\Users\Admin\AppData\Local\Temp\79B2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe B9A3B89C07A83B2DD454CCD0E51FBEC55093ABEC84A478C4F1F83B2F87FF5A300E70556A7513C8DC8B8BC9EB56E98EB4F7FFC6BC37C89C7F8761F003BB7177E42⤵
- Deletes itself
- Executes dropped EXE
PID:2072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5651af2395773f5ba9f4e0094c286592d
SHA17a4f5166f061c73abed9758b2d2efb7d47283a6b
SHA25647d971fa81cd05a337a343072558827854dbee64718599ade9d0af8bb471265e
SHA512d12b414312169e59737f0a9e964b953f2b986973c8a12cbb14e1d76212a924432909a65709932835c2fd0791ed7be191048bf4503e6eaf85b2f4850a97da0f19
-
Filesize
414KB
MD5651af2395773f5ba9f4e0094c286592d
SHA17a4f5166f061c73abed9758b2d2efb7d47283a6b
SHA25647d971fa81cd05a337a343072558827854dbee64718599ade9d0af8bb471265e
SHA512d12b414312169e59737f0a9e964b953f2b986973c8a12cbb14e1d76212a924432909a65709932835c2fd0791ed7be191048bf4503e6eaf85b2f4850a97da0f19