Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
17/09/2023, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe
Resource
win10v2004-20230915-en
General
-
Target
60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe
-
Size
14.3MB
-
MD5
08e924314b73383707beb24a882dfe04
-
SHA1
927c3b769c83880fb814213d564febed6b018d0c
-
SHA256
60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573
-
SHA512
c5845d7e2af478251c8237e57b6c673dd15e49d80937893f3d8e275414d16aad0213fd4457599d68a501c125507ac579edb68f3d5fb71920e2e6c247d05ed26e
-
SSDEEP
196608:pBOt/rkLxhHyogA0ph4x/jfWnw49A6Gw8OdTJ3bZ4cpj8FEJZkQBHGvK74mpSd52:2t/r4xcDAx73wG+dX45iAMGvSppSd52
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp -
Loads dropped DLL 1 IoCs
pid Process 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28 PID 2412 wrote to memory of 2280 2412 60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe"C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp"C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp" /SL5="$7011E,14154793,732160,C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp
Filesize2.9MB
MD516b52379dd6c2c1ae7cc68eca146a5f4
SHA149cf93a8494ce9db49b4a6474a3d9adeb825665b
SHA256b6caada601dee3bdbdf4b66f0471ec5ccd031ad8665b81333e04d4d9a7fd4b98
SHA5124d5acd9a52e70de61afc0e93b7c850ae14afa5900170df7c05aa3ec802fd2c19bfec17b53ddebb13b81fbf7760360d2c028b537b55e05c5c70644b3579494055
-
\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp
Filesize2.9MB
MD516b52379dd6c2c1ae7cc68eca146a5f4
SHA149cf93a8494ce9db49b4a6474a3d9adeb825665b
SHA256b6caada601dee3bdbdf4b66f0471ec5ccd031ad8665b81333e04d4d9a7fd4b98
SHA5124d5acd9a52e70de61afc0e93b7c850ae14afa5900170df7c05aa3ec802fd2c19bfec17b53ddebb13b81fbf7760360d2c028b537b55e05c5c70644b3579494055