Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
fa67e0fc8b023dexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fa67e0fc8b023dexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
fa67e0fc8b023dexe_JC.exe
-
Size
412KB
-
MD5
fa67e0fc8b023d08814a729455cbb4c9
-
SHA1
c729375cfd2185549f3a4625870a2481bb757302
-
SHA256
a27c9a343cbf374cf5826338a4d11684f746bd06f452161fe0f70df6d8d60075
-
SHA512
cf99cee55ca4d69de6d5e05a1d42a3df9f368155df390dcfa0935e9fd8eda295e01143e11d4024d0abf86666cfd1c3a88f7181a7152a8b8444abe00c28b5fce7
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnkB9CAYCdUCQxT4DQ/TuXxPUCgzIPanP:U6PCrIc9kph5JAHdExTWQ/TIEzIPe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1916 8546.tmp -
Executes dropped EXE 1 IoCs
pid Process 1916 8546.tmp -
Loads dropped DLL 1 IoCs
pid Process 1696 fa67e0fc8b023dexe_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1916 1696 fa67e0fc8b023dexe_JC.exe 28 PID 1696 wrote to memory of 1916 1696 fa67e0fc8b023dexe_JC.exe 28 PID 1696 wrote to memory of 1916 1696 fa67e0fc8b023dexe_JC.exe 28 PID 1696 wrote to memory of 1916 1696 fa67e0fc8b023dexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa67e0fc8b023dexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fa67e0fc8b023dexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\8546.tmp"C:\Users\Admin\AppData\Local\Temp\8546.tmp" --pingC:\Users\Admin\AppData\Local\Temp\fa67e0fc8b023dexe_JC.exe 9038781CEEE8E34FB2B79CB70BE47E54B9E66F2F4039631521A7F15FA3AA226B127F7248D3FD70402E0260163C8BFED912D6260CA4CB3A51B436F3DFF86331972⤵
- Deletes itself
- Executes dropped EXE
PID:1916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD54fb4071fb00bf6d4eea402c8a10f67b2
SHA1f37dcdde1e4eaa7635065dc5a3f6c0dec63812c1
SHA25677781bca0f5341031f2a645783cb5d34b2fce8847fa74a24c5d91db1dfdf2e74
SHA5127d2f4a509a50b14286eec940f4a149278982dd725b16892efc560c3f57e4d3e6646892e380c0e9cdaf1fea8f1f0c34dcc55e0331430ffdc3253af967b31dac05
-
Filesize
412KB
MD54fb4071fb00bf6d4eea402c8a10f67b2
SHA1f37dcdde1e4eaa7635065dc5a3f6c0dec63812c1
SHA25677781bca0f5341031f2a645783cb5d34b2fce8847fa74a24c5d91db1dfdf2e74
SHA5127d2f4a509a50b14286eec940f4a149278982dd725b16892efc560c3f57e4d3e6646892e380c0e9cdaf1fea8f1f0c34dcc55e0331430ffdc3253af967b31dac05