Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:35
Static task
static1
Behavioral task
behavioral1
Sample
08c942390163c92667923569ac8e0854.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08c942390163c92667923569ac8e0854.exe
Resource
win10v2004-20231215-en
General
-
Target
08c942390163c92667923569ac8e0854.exe
-
Size
1.9MB
-
MD5
08c942390163c92667923569ac8e0854
-
SHA1
35987c136c905e2fbb1f803ab8738fa615526c38
-
SHA256
39c564808b48de8328b67aa0b2bf6cda694819a436f55c433698c1915be7d623
-
SHA512
2cb0439c60b19ef573dc9b86e3b282f0e5acaa5f01e82f7fc3563228dabf76e622c10ce7090be2be2f2d998f77b73956fa880914ac04dfd5d9326be1c057d9a2
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dpIY0j+81wcCl9tD8zE41yrgUWX3GcX/y5OdE:Qoa1taC070dyYe1w9VY1cKW68Od8VGc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 483.tmp -
Executes dropped EXE 1 IoCs
pid Process 2660 483.tmp -
Loads dropped DLL 1 IoCs
pid Process 3048 08c942390163c92667923569ac8e0854.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2660 3048 08c942390163c92667923569ac8e0854.exe 28 PID 3048 wrote to memory of 2660 3048 08c942390163c92667923569ac8e0854.exe 28 PID 3048 wrote to memory of 2660 3048 08c942390163c92667923569ac8e0854.exe 28 PID 3048 wrote to memory of 2660 3048 08c942390163c92667923569ac8e0854.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe"C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\483.tmp"C:\Users\Admin\AppData\Local\Temp\483.tmp" --splashC:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe 9F74F965ECC26B604303A78CFF2CE33E208D6A96477F0F69FD2E8E4F4739C580D1FD343494FBA8F864CC26E6E11F2BB5B4EE746F0043C7B661053E9E0C29C8702⤵
- Deletes itself
- Executes dropped EXE
PID:2660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5443a0c3ca1ff5c4fa9a393a388a6554c
SHA13fd11c0221417088dbf6206642470eb6d5313f04
SHA2566219b789e20fdbe3d8d99cc404f125b1e5674422e24ec8d149307d93582d134c
SHA512c99e6afa069fc217259150cc7695ee030c2a11b7eb37fc66eb5e8922b9e9b2c8a143ca1a8a7d817b17e9b988fc56906bcd17022913a4d92c261dfe9017514b69