Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
304f416de59cad57524236db5a085d36.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
304f416de59cad57524236db5a085d36.exe
Resource
win10v2004-20231201-en
General
-
Target
304f416de59cad57524236db5a085d36.exe
-
Size
1.9MB
-
MD5
304f416de59cad57524236db5a085d36
-
SHA1
17db1869a70f1f1e83a8cb7000d2a80f02657a45
-
SHA256
71fcbcdd7962ab8d3fc6a2d18da6a4bfd18bda18245064104a4f5c59ef6b3cbf
-
SHA512
8be4f743f6d2ef0f162e321d1de6ce16a6e5a280d6b14d505a2e94343f55cc776646390c26e5c85bcbcf53d2a8087ff1abb85801de04d7598c7db4140a6b5f97
-
SSDEEP
49152:Qoa1taC070d3lx6wZmYa8gywY+4VZrSfqC5KP:Qoa1taC0ExtDgyZf4qOKP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 10E2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2232 10E2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2196 304f416de59cad57524236db5a085d36.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2232 2196 304f416de59cad57524236db5a085d36.exe 28 PID 2196 wrote to memory of 2232 2196 304f416de59cad57524236db5a085d36.exe 28 PID 2196 wrote to memory of 2232 2196 304f416de59cad57524236db5a085d36.exe 28 PID 2196 wrote to memory of 2232 2196 304f416de59cad57524236db5a085d36.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\304f416de59cad57524236db5a085d36.exe"C:\Users\Admin\AppData\Local\Temp\304f416de59cad57524236db5a085d36.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\10E2.tmp"C:\Users\Admin\AppData\Local\Temp\10E2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\304f416de59cad57524236db5a085d36.exe F16C699089E7CAD5EF0F14BB7F68B1DA22CADAE7C6E6D86858476B7188D4F2F2F0F9A56813FE175F00D68C8EC0CFA75D037B5861DBDC496F05A561814D83AEA62⤵
- Deletes itself
- Executes dropped EXE
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD549684ce08fcd5a2dc550160768b5952f
SHA158a0e35b3a57ff03b0c0ed6f27e4906ecc7e0ced
SHA256882bc9e380d10032688261d61b336abdc66902193f93061c4eed89bb6c7405c7
SHA5129c27829d7dedabdddcc35ee8e9022934aba992de94fea4138261874c6b80b0644939048c117d86923f4804e7709bf96c74e9cc55b08d5522d862da9a35303e43