Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
f04cae87e70252cde9b81bc57254bd10_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f04cae87e70252cde9b81bc57254bd10_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
f04cae87e70252cde9b81bc57254bd10_exe32.exe
-
Size
468KB
-
MD5
f04cae87e70252cde9b81bc57254bd10
-
SHA1
152b6588b75d7e7da3e6eb8f0725120472c48985
-
SHA256
348ab9c9237e72f4605fa3aeaf42ef911fcdf84bcbdd91b07483f7243333b5b0
-
SHA512
25bb493e85ccdb2ccaab5224bec9024c52a2c22d2100cfaa53485059dc1faf3ada2d3f95214a098637411a6661bb92f3b64c424ff03c6ff9cdfa88e03dc48e54
-
SSDEEP
6144:Cg2uH8y29HMHKezpTvqYwTHhBrl9KEY5Ggvkmgm33B78YBc7:Zd8dWHlSYwjrlQXhNgmhYYBc7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 5042.tmp -
Executes dropped EXE 1 IoCs
pid Process 2852 5042.tmp -
Loads dropped DLL 1 IoCs
pid Process 3064 f04cae87e70252cde9b81bc57254bd10_exe32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2852 3064 f04cae87e70252cde9b81bc57254bd10_exe32.exe 28 PID 3064 wrote to memory of 2852 3064 f04cae87e70252cde9b81bc57254bd10_exe32.exe 28 PID 3064 wrote to memory of 2852 3064 f04cae87e70252cde9b81bc57254bd10_exe32.exe 28 PID 3064 wrote to memory of 2852 3064 f04cae87e70252cde9b81bc57254bd10_exe32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04cae87e70252cde9b81bc57254bd10_exe32.exe"C:\Users\Admin\AppData\Local\Temp\f04cae87e70252cde9b81bc57254bd10_exe32.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp" --pingC:\Users\Admin\AppData\Local\Temp\f04cae87e70252cde9b81bc57254bd10_exe32.exe 55B0DE66A9540E4AB402B0C796AC1D171A6B5926C308BC6574420D1C77E58916F9F6743D83539A887635FA12F27EC8C19D57855E5FCCC069393BCD07C731B0182⤵
- Deletes itself
- Executes dropped EXE
PID:2852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5961ac9f96803ca12ac43ae6f71807d80
SHA1b912770dcee630339b5a6fc9e1d3d4ba3ed27d35
SHA25633ce37a2b2beca51fef0a6225136a9b0e14303df5f8ffe82bcc60765730611da
SHA512d6c2feaf02d19826ec3e1100e35c3d5d653154946ba852772f6c7b2c86f14a636de8981c294273f0def33cab8529c6a2f89fdb059bfd988b63eebb2aa4fc5205
-
Filesize
468KB
MD5961ac9f96803ca12ac43ae6f71807d80
SHA1b912770dcee630339b5a6fc9e1d3d4ba3ed27d35
SHA25633ce37a2b2beca51fef0a6225136a9b0e14303df5f8ffe82bcc60765730611da
SHA512d6c2feaf02d19826ec3e1100e35c3d5d653154946ba852772f6c7b2c86f14a636de8981c294273f0def33cab8529c6a2f89fdb059bfd988b63eebb2aa4fc5205