Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
4cb414aec5ce5e74a08c44144ec9dbd4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4cb414aec5ce5e74a08c44144ec9dbd4.exe
Resource
win10v2004-20231201-en
General
-
Target
4cb414aec5ce5e74a08c44144ec9dbd4.exe
-
Size
1.9MB
-
MD5
4cb414aec5ce5e74a08c44144ec9dbd4
-
SHA1
53352a33a7cf01bedf093e5aaceb8fd3762d6c82
-
SHA256
421bc33db1d9737cc0ea92759124e822a6caa7611560433796e172765671e8aa
-
SHA512
52fe7a76705c4dfeadb0040c7a9ad9bd54b1f35e0b81e9beb7e8c3b2e9c307b11ebf2ee6606cd71576285d07db0ea0fc5707fa3a03ba76b021e6b2488379dbd6
-
SSDEEP
49152:Qoa1taC070dBP0NiRbeCtZZsex/HzbeGv:Qoa1taC0q0glZsel6U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2264 1A06.tmp -
Executes dropped EXE 1 IoCs
pid Process 2264 1A06.tmp -
Loads dropped DLL 1 IoCs
pid Process 1576 4cb414aec5ce5e74a08c44144ec9dbd4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2264 1576 4cb414aec5ce5e74a08c44144ec9dbd4.exe 28 PID 1576 wrote to memory of 2264 1576 4cb414aec5ce5e74a08c44144ec9dbd4.exe 28 PID 1576 wrote to memory of 2264 1576 4cb414aec5ce5e74a08c44144ec9dbd4.exe 28 PID 1576 wrote to memory of 2264 1576 4cb414aec5ce5e74a08c44144ec9dbd4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cb414aec5ce5e74a08c44144ec9dbd4.exe"C:\Users\Admin\AppData\Local\Temp\4cb414aec5ce5e74a08c44144ec9dbd4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\1A06.tmp"C:\Users\Admin\AppData\Local\Temp\1A06.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4cb414aec5ce5e74a08c44144ec9dbd4.exe 46576A88702F40A4E1B8A7C2DE64A9A704BA0C9F6FCB636BBA4009C95E73FEBB18D4A96DBD14F4007CA65C429CC041A9604AE1123957EB3BE99A706A356F4A1A2⤵
- Deletes itself
- Executes dropped EXE
PID:2264
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD53e57665dd57d78c3c5b34f9027d07478
SHA1e6eda1321ea2fae5454f4b2da3dd7556528a8bb9
SHA256d4d9df1cca99cddb895709976691bfcddbe15551726d631d5f492f1e3d04381b
SHA512a3e648cf335e56c09101126a1bc37c62f059a2e7c00a678f5a6e53cad7c50121f3e447bf9f12fed7706b246a2acafbfa3a8b67c0781844442e1845224b3b0f4b
-
Filesize
1.9MB
MD50fc9e8c6867959b79cd701bc82e4456e
SHA1be7608846f0855148d0a77a5767d4ff49fa48ddc
SHA256e3e3465dde03e39ef5f68ba3d9570bd5f9045cf5ba971ced3cd05eed0488616b
SHA51227e035c55364cbdcc89366711de51482ca35b504c7a411996db69151843ee72e9b7217d2dd96f2d4cf09bd4e5f5b818f1c5423192b69c0432f31168c9837d669