Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
06b8577529e31a422d3bd68fec6f85d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06b8577529e31a422d3bd68fec6f85d1.exe
Resource
win10v2004-20231215-en
General
-
Target
06b8577529e31a422d3bd68fec6f85d1.exe
-
Size
1.5MB
-
MD5
06b8577529e31a422d3bd68fec6f85d1
-
SHA1
90dfcdbbbf0c03504495c50807c3211e922a04ce
-
SHA256
0a5018c8d491f2e5c3824b0276780587941a297a9d22a4c11b38833d818324de
-
SHA512
24532b7945f5627f0c1e0612aca77b01b2dc2e23f2909e235377c884206ed0ab401c7ef78782177dfbebb6897305ff8bbca710f938f83f440450df3704664be2
-
SSDEEP
49152:lrq0R07QQmtMpUAW/8QxHXCUBRxL+WwfrZ:hq0+7W/8QxzBRxL+pN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 56D7.tmp -
Executes dropped EXE 1 IoCs
pid Process 1048 56D7.tmp -
Loads dropped DLL 1 IoCs
pid Process 2472 06b8577529e31a422d3bd68fec6f85d1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1048 2472 06b8577529e31a422d3bd68fec6f85d1.exe 28 PID 2472 wrote to memory of 1048 2472 06b8577529e31a422d3bd68fec6f85d1.exe 28 PID 2472 wrote to memory of 1048 2472 06b8577529e31a422d3bd68fec6f85d1.exe 28 PID 2472 wrote to memory of 1048 2472 06b8577529e31a422d3bd68fec6f85d1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe"C:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\56D7.tmp"C:\Users\Admin\AppData\Local\Temp\56D7.tmp" --pingC:\Users\Admin\AppData\Local\Temp\06b8577529e31a422d3bd68fec6f85d1.exe DE94173BB221FF12B87719CEE95F231218B9964E1DBB92D0313059A1C269CA3F803C46001F2DB301BCFE38168F13ECBB1801ACA68726D1E0F353AF75C343E4322⤵
- Deletes itself
- Executes dropped EXE
PID:1048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD50450732e242786e88956b642d5636717
SHA108872248d8e0eddec24963062914a6f505f09c50
SHA256ce6764ca7a68288ea5c1b30a8dfc9caf40aea52e0e5668c14becb3e79170c8e9
SHA51228baa52b1ec65af4289b13e6a8c6c906500e6066cc8726465db61e379202c7633bef979af67762cd07959d11e412f4dc25a22f6623aee72213e8847617e31020