Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
6124ce9d519efab11d0709ea1b5a7fb0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6124ce9d519efab11d0709ea1b5a7fb0.exe
Resource
win10v2004-20231215-en
General
-
Target
6124ce9d519efab11d0709ea1b5a7fb0.exe
-
Size
1.9MB
-
MD5
6124ce9d519efab11d0709ea1b5a7fb0
-
SHA1
001025d2aa7ca2d13d9326c28a3f754262bea7f9
-
SHA256
e43bbe5bb702774c4164e91adab84c3e2166dd9c38a53b25793e4d756e5db139
-
SHA512
7c4175e45e2b22d0e8efc754b7c7fc3a43388b7e8e026641261dc80955473cd3d149ca4556ec81b9a4960ea149f665bcf9ce85734fa26bdc789a67b9f07fd847
-
SSDEEP
49152:Qoa1taC070doXRglfGxPXxylfjMtvmXFn+ytTXiHE:Qoa1taC0bhiVlfAoxiHE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 1A73.tmp -
Executes dropped EXE 1 IoCs
pid Process 2388 1A73.tmp -
Loads dropped DLL 1 IoCs
pid Process 2084 6124ce9d519efab11d0709ea1b5a7fb0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2388 2084 6124ce9d519efab11d0709ea1b5a7fb0.exe 28 PID 2084 wrote to memory of 2388 2084 6124ce9d519efab11d0709ea1b5a7fb0.exe 28 PID 2084 wrote to memory of 2388 2084 6124ce9d519efab11d0709ea1b5a7fb0.exe 28 PID 2084 wrote to memory of 2388 2084 6124ce9d519efab11d0709ea1b5a7fb0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe"C:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\1A73.tmp"C:\Users\Admin\AppData\Local\Temp\1A73.tmp" --splashC:\Users\Admin\AppData\Local\Temp\6124ce9d519efab11d0709ea1b5a7fb0.exe B44AE70808B7BAB24DF40D52D82609EB4CC288D09FFF5083E586DC234DDC17AA6CF4D841D0734EC1F2221076FF8BE1C3297BAE55CDC7DDF770BDDA21902A76D12⤵
- Deletes itself
- Executes dropped EXE
PID:2388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD57b3e19e438e5589bf0107bda567a15a7
SHA1a8633d8af341fe4aacd33763c3a4d794428729ee
SHA2568b5508409aac0ca0a427ecb073b7bc37268227a6ef820926c28c76e650aa8e6b
SHA5123ddc42383d7aaaea58ecc38fa85487d691b329992bd2190d8b583e23a839e01d4e3fc9328891e74b78730c98fb4139b374bd81c2857e0560d64e3c46fd66e68a
-
Filesize
383KB
MD59631623bbbd89aa4258e652c28e9e95b
SHA1ae9ebfc6404ad53c3d61fd83daa628c85bcdd6be
SHA2569b46991102fb13e64b6baa66b617a88e2502bd65477fbf1350959eaffa00684a
SHA512d5861d1a4a1e1ae796c01763750d747f3507e0db8ded8a6df1d2dc9da673988cdabeb65b823460406740686f1e40c04d91d5c10a2698993187f2f4f09dc3ccd3