Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
0e0be25914df7659696550437c072c76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e0be25914df7659696550437c072c76.exe
Resource
win10v2004-20231215-en
General
-
Target
0e0be25914df7659696550437c072c76.exe
-
Size
1.5MB
-
MD5
0e0be25914df7659696550437c072c76
-
SHA1
d41af20047919b28ef7d7f0bc89626eda6fe4bd8
-
SHA256
a4fe1a0e188f0f7f68d433b2487814587809bcf97f697d2fe93ef125f17f4147
-
SHA512
8466ad752410c6e3a65238649cad00f5eae021e935cc5bfcad453054c8d23edb41fb083e9cb3bad33cfbeb5f8891f2de74580ca90e152ba71b189d1fec0f1d6d
-
SSDEEP
24576:e9dG37Vk0R07Qanm9KalCNAO6+e3dnguICtXOm4c+N2jSlEFpyAUMCvp:lrq0R07QQm6Nvig3Ctem4celSvyAUnp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 1851.tmp -
Executes dropped EXE 1 IoCs
pid Process 2924 1851.tmp -
Loads dropped DLL 1 IoCs
pid Process 2084 0e0be25914df7659696550437c072c76.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2924 2084 0e0be25914df7659696550437c072c76.exe 28 PID 2084 wrote to memory of 2924 2084 0e0be25914df7659696550437c072c76.exe 28 PID 2084 wrote to memory of 2924 2084 0e0be25914df7659696550437c072c76.exe 28 PID 2084 wrote to memory of 2924 2084 0e0be25914df7659696550437c072c76.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0be25914df7659696550437c072c76.exe"C:\Users\Admin\AppData\Local\Temp\0e0be25914df7659696550437c072c76.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\1851.tmp"C:\Users\Admin\AppData\Local\Temp\1851.tmp" --pingC:\Users\Admin\AppData\Local\Temp\0e0be25914df7659696550437c072c76.exe 3BEBEA8A012236A8C4D7603111A7432FC09EC26C870E780C728163C40DF04ED045F68809925037A5AA3208531D459F4821B0224724ED42F42ADAF10ABF79CA142⤵
- Deletes itself
- Executes dropped EXE
PID:2924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53f1b64fb858e31ea0e18cecf55fe6f08
SHA19406ea3cc17f32fadd1392f813d6a252aee48aa6
SHA256cadcaa0b965b9e67069c2a6dc24d40e7d8aeb6c4e8142c5cba0c3f3c2de33a45
SHA5128bd9e8532488a93b431e4315eb054a9b919cc5a12e9cc0f62406b6f93b0e51775f8ab30a71b41b3a5d305e241fc715cda6b873d48be34ce89cfb53a72043cbf3