Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 10:35

General

  • Target

    08c942390163c92667923569ac8e0854.exe

  • Size

    1.9MB

  • MD5

    08c942390163c92667923569ac8e0854

  • SHA1

    35987c136c905e2fbb1f803ab8738fa615526c38

  • SHA256

    39c564808b48de8328b67aa0b2bf6cda694819a436f55c433698c1915be7d623

  • SHA512

    2cb0439c60b19ef573dc9b86e3b282f0e5acaa5f01e82f7fc3563228dabf76e622c10ce7090be2be2f2d998f77b73956fa880914ac04dfd5d9326be1c057d9a2

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dpIY0j+81wcCl9tD8zE41yrgUWX3GcX/y5OdE:Qoa1taC070dyYe1w9VY1cKW68Od8VGc

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe
    "C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\483.tmp
      "C:\Users\Admin\AppData\Local\Temp\483.tmp" --splashC:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe 9F74F965ECC26B604303A78CFF2CE33E208D6A96477F0F69FD2E8E4F4739C580D1FD343494FBA8F864CC26E6E11F2BB5B4EE746F0043C7B661053E9E0C29C870
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\483.tmp

    Filesize

    1.9MB

    MD5

    443a0c3ca1ff5c4fa9a393a388a6554c

    SHA1

    3fd11c0221417088dbf6206642470eb6d5313f04

    SHA256

    6219b789e20fdbe3d8d99cc404f125b1e5674422e24ec8d149307d93582d134c

    SHA512

    c99e6afa069fc217259150cc7695ee030c2a11b7eb37fc66eb5e8922b9e9b2c8a143ca1a8a7d817b17e9b988fc56906bcd17022913a4d92c261dfe9017514b69

  • memory/2660-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3048-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB