Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 10:42

General

  • Target

    0af6a9a9d4c98a0da92c5f0927c1179e.exe

  • Size

    1.9MB

  • MD5

    0af6a9a9d4c98a0da92c5f0927c1179e

  • SHA1

    d8e9b532ca4a40496f122e09036fa8e444023189

  • SHA256

    82de2bbca17f20d33a5706df513eb05ec53702c62621c459e2b59feb250917c3

  • SHA512

    02fecfc2eca695960af4ce45e38af688f094d3422a194e05bdc2f95462cfedeaec38709a802649c5ea06cd3cb04ca4ac4f372b0b65fa05300cdf433df960200e

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10d4bophiNj/onSYgDGshbjUA7n372Pky+V07:Qoa1taC070dRhiKSY69bjLb7CkzC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe
    "C:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\7AE.tmp
      "C:\Users\Admin\AppData\Local\Temp\7AE.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe EE412CFACCE4AC3A8A3C887298333AF3E877B399890CD6F85DE201697153F98000BA1CEA1D2E4905583E597161309A3271A190645A5E66513C691FAA8844416C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7AE.tmp

    Filesize

    782KB

    MD5

    18abc7530c825a986db691c176bbe176

    SHA1

    bb292bc93f4f369a06a051d688a6e255c878e3b7

    SHA256

    887994db15a70349800e1b5125765370d04f3e42880ff770cdc5c856bb2ccce9

    SHA512

    3058ae8864706ae67e9052da74708dcf9e7661ef50962f6618a96aff2b81c92928313e524c8851782641ff896f400407fda4302a09ec3cb9a762acb6309c8431

  • \Users\Admin\AppData\Local\Temp\7AE.tmp

    Filesize

    774KB

    MD5

    66f7255c2660847f2002beee8a0c4517

    SHA1

    c8641bf1722af4cf1186f199bce90d72c43a9498

    SHA256

    30c72179b7720c17bb4ab668babf57ec3ff6e99e1a5520ad0fcee2ff76079b26

    SHA512

    5d69dddfbcd40de79244cd3a18af30ccc910c2569d608ab84f26abaec3b73a0870843695bf69ee315a12361aeeb7e784c330eeb60e71728db9cbd54047a86b45

  • memory/1216-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2356-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB