Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 04:11

General

  • Target

    6124ce9d519efab11d0709ea1b5a7fb0.exe

  • Size

    1.9MB

  • MD5

    6124ce9d519efab11d0709ea1b5a7fb0

  • SHA1

    001025d2aa7ca2d13d9326c28a3f754262bea7f9

  • SHA256

    e43bbe5bb702774c4164e91adab84c3e2166dd9c38a53b25793e4d756e5db139

  • SHA512

    7c4175e45e2b22d0e8efc754b7c7fc3a43388b7e8e026641261dc80955473cd3d149ca4556ec81b9a4960ea149f665bcf9ce85734fa26bdc789a67b9f07fd847

  • SSDEEP

    49152:Qoa1taC070doXRglfGxPXxylfjMtvmXFn+ytTXiHE:Qoa1taC0bhiVlfAoxiHE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe
    "C:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\1A73.tmp
      "C:\Users\Admin\AppData\Local\Temp\1A73.tmp" --splashC:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe B44AE70808B7BAB24DF40D52D82609EB4CC288D09FFF5083E586DC234DDC17AA6CF4D841D0734EC1F2221076FF8BE1C3297BAE55CDC7DDF770BDDA21902A76D1
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2388

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1A73.tmp

          Filesize

          408KB

          MD5

          7b3e19e438e5589bf0107bda567a15a7

          SHA1

          a8633d8af341fe4aacd33763c3a4d794428729ee

          SHA256

          8b5508409aac0ca0a427ecb073b7bc37268227a6ef820926c28c76e650aa8e6b

          SHA512

          3ddc42383d7aaaea58ecc38fa85487d691b329992bd2190d8b583e23a839e01d4e3fc9328891e74b78730c98fb4139b374bd81c2857e0560d64e3c46fd66e68a

        • \Users\Admin\AppData\Local\Temp\1A73.tmp

          Filesize

          383KB

          MD5

          9631623bbbd89aa4258e652c28e9e95b

          SHA1

          ae9ebfc6404ad53c3d61fd83daa628c85bcdd6be

          SHA256

          9b46991102fb13e64b6baa66b617a88e2502bd65477fbf1350959eaffa00684a

          SHA512

          d5861d1a4a1e1ae796c01763750d747f3507e0db8ded8a6df1d2dc9da673988cdabeb65b823460406740686f1e40c04d91d5c10a2698993187f2f4f09dc3ccd3

        • memory/2084-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/2388-6-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB