Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 10:30

General

  • Target

    06b8577529e31a422d3bd68fec6f85d1.exe

  • Size

    1.5MB

  • MD5

    06b8577529e31a422d3bd68fec6f85d1

  • SHA1

    90dfcdbbbf0c03504495c50807c3211e922a04ce

  • SHA256

    0a5018c8d491f2e5c3824b0276780587941a297a9d22a4c11b38833d818324de

  • SHA512

    24532b7945f5627f0c1e0612aca77b01b2dc2e23f2909e235377c884206ed0ab401c7ef78782177dfbebb6897305ff8bbca710f938f83f440450df3704664be2

  • SSDEEP

    49152:lrq0R07QQmtMpUAW/8QxHXCUBRxL+WwfrZ:hq0+7W/8QxzBRxL+pN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe
    "C:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\56D7.tmp
      "C:\Users\Admin\AppData\Local\Temp\56D7.tmp" --pingC:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe DE94173BB221FF12B87719CEE95F231218B9964E1DBB92D0313059A1C269CA3F803C46001F2DB301BCFE38168F13ECBB1801ACA68726D1E0F353AF75C343E432
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1048

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\56D7.tmp

          Filesize

          1.5MB

          MD5

          0450732e242786e88956b642d5636717

          SHA1

          08872248d8e0eddec24963062914a6f505f09c50

          SHA256

          ce6764ca7a68288ea5c1b30a8dfc9caf40aea52e0e5668c14becb3e79170c8e9

          SHA512

          28baa52b1ec65af4289b13e6a8c6c906500e6066cc8726465db61e379202c7633bef979af67762cd07959d11e412f4dc25a22f6623aee72213e8847617e31020

        • memory/1048-9-0x0000000000840000-0x0000000000A0E000-memory.dmp

          Filesize

          1.8MB

        • memory/1048-10-0x00000000001C0000-0x000000000023A000-memory.dmp

          Filesize

          488KB

        • memory/2472-1-0x0000000000300000-0x000000000037A000-memory.dmp

          Filesize

          488KB

        • memory/2472-0-0x0000000000EC0000-0x000000000108E000-memory.dmp

          Filesize

          1.8MB

        • memory/2472-8-0x0000000000300000-0x000000000037A000-memory.dmp

          Filesize

          488KB