Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
40d874d957f93eexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
40d874d957f93eexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
40d874d957f93eexeexe_JC.exe
-
Size
412KB
-
MD5
40d874d957f93e26da80e54f3e4489fc
-
SHA1
a6f63a5676211134821e72e29299c3cc8a355580
-
SHA256
8946dfb4edeaa415ddbaeaad2f3ab87a471e5620be46d0204886ef86e5bf8ac5
-
SHA512
612dcc1c336c97e879fb44ddbb31508ba4c8e41138f530d2816e2500e9a268bdf077e2c0720ba345eb7a381387443080316fb217b7b316ac0f52129ca20b2a19
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnNnM53ouK9Yg/q1jHVrQLVZsKabZjXDhdZQJmMP:U6PCrIc9kph53UvM3/q1jH5muFVjXW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2224 BE5F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2224 BE5F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2080 40d874d957f93eexeexe_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2224 2080 40d874d957f93eexeexe_JC.exe 28 PID 2080 wrote to memory of 2224 2080 40d874d957f93eexeexe_JC.exe 28 PID 2080 wrote to memory of 2224 2080 40d874d957f93eexeexe_JC.exe 28 PID 2080 wrote to memory of 2224 2080 40d874d957f93eexeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d874d957f93eexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\40d874d957f93eexeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\BE5F.tmp"C:\Users\Admin\AppData\Local\Temp\BE5F.tmp" --pingC:\Users\Admin\AppData\Local\Temp\40d874d957f93eexeexe_JC.exe F9C52B92FE055BD904F737ADA4A65F928C03046ABF11F09935ADB6710235C8A5AC3F1FD7E8D1D21CFB8A614AB4263C3D14A5D696013B94F005FD23F36EEF80BD2⤵
- Deletes itself
- Executes dropped EXE
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD564f815aa38398c09a3d8d1e66414c4de
SHA1be5ccd86dc37f183349c89b82c4a97a8fa697483
SHA256129e43957af2b391085c4d3e9a0029eecb1c3a22cef99446abe622c2adf4e897
SHA512c8c196ec06312b3c976ec1c0201f5a98e539cdcf0cd0642dbd5d79542d679a74bead9add04190047aa894abd095b97f8c03ea232bf1c9897cae9c89c1c374443
-
Filesize
412KB
MD564f815aa38398c09a3d8d1e66414c4de
SHA1be5ccd86dc37f183349c89b82c4a97a8fa697483
SHA256129e43957af2b391085c4d3e9a0029eecb1c3a22cef99446abe622c2adf4e897
SHA512c8c196ec06312b3c976ec1c0201f5a98e539cdcf0cd0642dbd5d79542d679a74bead9add04190047aa894abd095b97f8c03ea232bf1c9897cae9c89c1c374443