Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe
Resource
win10v2004-20230915-en
General
-
Target
67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe
-
Size
119KB
-
MD5
9863ee643f5f0a6a71e31c4432a16e36
-
SHA1
e56e4e9234e3faf9283ab5962a5a0939d98212df
-
SHA256
67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06
-
SHA512
d698eb9c07a3e9b06d9e587db958bcec683e68ba234db5ccfd3e92fbfa40a83f9cadd11aa2a700c80d5b0ce3fd2b37c61d1f0d3a3f4a625bfa2c0e44e9b7cd72
-
SSDEEP
3072:WcVWQNJaj1xYXUuyVcKn375ZLyAlSE04OpOz1C:sQrq1xYkuy9375dLGZMz1C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2240 1.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2240 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe 29 PID 2484 wrote to memory of 2240 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe 29 PID 2484 wrote to memory of 2240 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe 29 PID 2484 wrote to memory of 2240 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe 29 PID 2484 wrote to memory of 2240 2484 67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe"C:\Users\Admin\AppData\Local\Temp\67340169794cd8d32847d57604cc1865ff8f788f375f8e30235252c5edabdb06.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Public\1.exe"C:\Users\Public\1.exe"2⤵
- Executes dropped EXE
PID:2240
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5efe0a3f8a308f6d24a448177ba646dec
SHA13f4d8a4d4e7bb12eb07eba4dcec04d085f2ab943
SHA256dda46f06ab5c89cb03eaedc8aed37425846358a950659a80b693040e6db00d34
SHA512f98433761b9bf7451ce2df716ddee0398472fa595491507852b9c09315d5e106fe6bc09b156e7b09a68b1692bcb9070b2a9d7e01d8dac8109395b0da716f8f4a
-
Filesize
91KB
MD5efe0a3f8a308f6d24a448177ba646dec
SHA13f4d8a4d4e7bb12eb07eba4dcec04d085f2ab943
SHA256dda46f06ab5c89cb03eaedc8aed37425846358a950659a80b693040e6db00d34
SHA512f98433761b9bf7451ce2df716ddee0398472fa595491507852b9c09315d5e106fe6bc09b156e7b09a68b1692bcb9070b2a9d7e01d8dac8109395b0da716f8f4a