Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:42
Static task
static1
Behavioral task
behavioral1
Sample
0af6a9a9d4c98a0da92c5f0927c1179e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0af6a9a9d4c98a0da92c5f0927c1179e.exe
Resource
win10v2004-20231215-en
General
-
Target
0af6a9a9d4c98a0da92c5f0927c1179e.exe
-
Size
1.9MB
-
MD5
0af6a9a9d4c98a0da92c5f0927c1179e
-
SHA1
d8e9b532ca4a40496f122e09036fa8e444023189
-
SHA256
82de2bbca17f20d33a5706df513eb05ec53702c62621c459e2b59feb250917c3
-
SHA512
02fecfc2eca695960af4ce45e38af688f094d3422a194e05bdc2f95462cfedeaec38709a802649c5ea06cd3cb04ca4ac4f372b0b65fa05300cdf433df960200e
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10d4bophiNj/onSYgDGshbjUA7n372Pky+V07:Qoa1taC070dRhiKSY69bjLb7CkzC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 7AE.tmp -
Executes dropped EXE 1 IoCs
pid Process 1216 7AE.tmp -
Loads dropped DLL 1 IoCs
pid Process 2356 0af6a9a9d4c98a0da92c5f0927c1179e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1216 2356 0af6a9a9d4c98a0da92c5f0927c1179e.exe 28 PID 2356 wrote to memory of 1216 2356 0af6a9a9d4c98a0da92c5f0927c1179e.exe 28 PID 2356 wrote to memory of 1216 2356 0af6a9a9d4c98a0da92c5f0927c1179e.exe 28 PID 2356 wrote to memory of 1216 2356 0af6a9a9d4c98a0da92c5f0927c1179e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe"C:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\7AE.tmp"C:\Users\Admin\AppData\Local\Temp\7AE.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0af6a9a9d4c98a0da92c5f0927c1179e.exe EE412CFACCE4AC3A8A3C887298333AF3E877B399890CD6F85DE201697153F98000BA1CEA1D2E4905583E597161309A3271A190645A5E66513C691FAA8844416C2⤵
- Deletes itself
- Executes dropped EXE
PID:1216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782KB
MD518abc7530c825a986db691c176bbe176
SHA1bb292bc93f4f369a06a051d688a6e255c878e3b7
SHA256887994db15a70349800e1b5125765370d04f3e42880ff770cdc5c856bb2ccce9
SHA5123058ae8864706ae67e9052da74708dcf9e7661ef50962f6618a96aff2b81c92928313e524c8851782641ff896f400407fda4302a09ec3cb9a762acb6309c8431
-
Filesize
774KB
MD566f7255c2660847f2002beee8a0c4517
SHA1c8641bf1722af4cf1186f199bce90d72c43a9498
SHA25630c72179b7720c17bb4ab668babf57ec3ff6e99e1a5520ad0fcee2ff76079b26
SHA5125d69dddfbcd40de79244cd3a18af30ccc910c2569d608ab84f26abaec3b73a0870843695bf69ee315a12361aeeb7e784c330eeb60e71728db9cbd54047a86b45