Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
7.1MB
-
MD5
5fce5ae289b2b182f40224281c95e32e
-
SHA1
993d057925800ab37e89d015eb26e13a19697bac
-
SHA256
91692dc9ee87c41424213944763178a92e69b3f3269a218ba0dc2b39cd6676b1
-
SHA512
1ad11ca2627619a07c412079d3b84b0bf7808f22487005e3aec8ff0f1f2579d1ed65a5a740239d48b6c597ec24941e7337ccd78a3fdc04abe93216d6e85a33bd
-
SSDEEP
98304:CBRTypSKAaDqkxUCrM8bpT3BQKhX3R+Zx5Ge/R1GZQupdoTgJb/yBmVfCFyZtmK1:ICSKpDFxR9pOwX3UceE9nVqtLqEvAZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 tmp.tmp -
Loads dropped DLL 3 IoCs
pid Process 2416 tmp.exe 2684 tmp.tmp 2684 tmp.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28 PID 2416 wrote to memory of 2684 2416 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\is-540GU.tmp\tmp.tmp"C:\Users\Admin\AppData\Local\Temp\is-540GU.tmp\tmp.tmp" /SL5="$3014E,7092893,141824,C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c2200909c2dd2fb3557861390f120529
SHA15b7669a6e307eec66b3ef167f29735426024c150
SHA25655775133ec1b33c4771b5fc3c5164b2db183d15349eada5d061b2cc53249dc9a
SHA512bf794271a56161e4c8cd9497f5a1a10efe96ada4c69e9e55983c4178a73ef91f66f96aaca62996f945b0f3b0a4a10e2207a7856760c9b537d48cf5c2cb1aaac5
-
Filesize
1.1MB
MD5c2200909c2dd2fb3557861390f120529
SHA15b7669a6e307eec66b3ef167f29735426024c150
SHA25655775133ec1b33c4771b5fc3c5164b2db183d15349eada5d061b2cc53249dc9a
SHA512bf794271a56161e4c8cd9497f5a1a10efe96ada4c69e9e55983c4178a73ef91f66f96aaca62996f945b0f3b0a4a10e2207a7856760c9b537d48cf5c2cb1aaac5
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3