Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 10:38

General

  • Target

    09f84447d222a49e10aebeb126a313f8.exe

  • Size

    1.5MB

  • MD5

    09f84447d222a49e10aebeb126a313f8

  • SHA1

    a6e4128622294e117f265f8db32b88e3e91b8c25

  • SHA256

    d4b6e9571853d008360d20f6609b165bd6f17046b896fbe46125c7dea64fe3d7

  • SHA512

    5dd96ea3974d88e941452ae5f6f9231d2a3be4853aa399a6caa0f7152ba639374db5106f5f8cd120422a208485e782c27da43300726ba71600887c596d1b7630

  • SSDEEP

    24576:e9dG37Vk0R07Qanm9k4nIiWIGpzsvHvO1IAd6D2z38xJRmXEz:lrq0R07QQmaP1pRpgDiGRmUz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09f84447d222a49e10aebeb126a313f8.exe
    "C:\Users\Admin\AppData\Local\Temp\09f84447d222a49e10aebeb126a313f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\1084.tmp
      "C:\Users\Admin\AppData\Local\Temp\1084.tmp" --pingC:\Users\Admin\AppData\Local\Temp\09f84447d222a49e10aebeb126a313f8.exe D694BFC4E1FDF7F283B9A662695D27FE252E4128171B15FA2B991F46CE8138A6F69679023CE927B2E70C0B2C2BA9475A8F768C699B8261FFABDC59DD8AC55FEA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1084.tmp

    Filesize

    1.5MB

    MD5

    8899a01fcc01f759b0a389df7ebfef19

    SHA1

    e3920108f6c35bf89e39e44ae081438dc917797d

    SHA256

    fe49069fe818b586edeb2c2eaa404bb2ab8ef1f1c614b469a5d611bb57547f5c

    SHA512

    47c695b95cb4adcf1e013dff2a04cb8b4eb0c22412a6b7d9d8840ab5cf02be39315bef7d2b57b41242f49f03a165bb6beafe6914ffbe38fbe62bf8c2ddc044e6

  • memory/1416-1-0x0000000000270000-0x00000000002EA000-memory.dmp

    Filesize

    488KB

  • memory/1416-0-0x0000000000A70000-0x0000000000C3E000-memory.dmp

    Filesize

    1.8MB

  • memory/1416-8-0x0000000000270000-0x00000000002EA000-memory.dmp

    Filesize

    488KB

  • memory/2488-10-0x0000000000190000-0x000000000020A000-memory.dmp

    Filesize

    488KB

  • memory/2488-9-0x0000000000C20000-0x0000000000DEE000-memory.dmp

    Filesize

    1.8MB