Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23/09/2023, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
f905g80f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f905g80f.exe
Resource
win10v2004-20230915-en
General
-
Target
f905g80f.exe
-
Size
52.9MB
-
MD5
17c87cb308128a84ab4e6ceea817c202
-
SHA1
b3fb015f665038fe2024c84871325848bc6e646c
-
SHA256
d0121794d3c17b5dc6daad721e994d74ef804f08a777ec78715cb5fd82c3d3ef
-
SHA512
c3ebb95f7d5841c3139dd7c48f6b790c6cbd0bfff9a9dc0453e96863b461a2d74f2d1482a4e2fd9542cf442f39ef64efc447c6b91b9247d9a2328a48a7f92c8a
-
SSDEEP
1572864:D7dUEh69iy9ClaiHbKeqIdlC2D+3EwvQA:OB97BEJdlCv3EwV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 f905g80f.tmp -
Loads dropped DLL 3 IoCs
pid Process 2864 f905g80f.exe 2704 f905g80f.tmp 2704 f905g80f.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 f905g80f.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28 PID 2864 wrote to memory of 2704 2864 f905g80f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\is-MMNBA.tmp\f905g80f.tmp"C:\Users\Admin\AppData\Local\Temp\is-MMNBA.tmp\f905g80f.tmp" /SL5="$400CE,55051259,114176,C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555