Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
9031fbf2a38a2a986f3426db6c58e3f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9031fbf2a38a2a986f3426db6c58e3f7.exe
Resource
win10v2004-20231215-en
General
-
Target
9031fbf2a38a2a986f3426db6c58e3f7.exe
-
Size
359KB
-
MD5
9031fbf2a38a2a986f3426db6c58e3f7
-
SHA1
9c9dc1aa36402b607c9931fa08a0161c02cbc58c
-
SHA256
5331dd9b16a69cdf59bddaa0f791ac8664bc762f6084755d0cee680b092e36e0
-
SHA512
01afe18dafef15dde65a0fc3e072cdd6afcba57703ea779aab7bb5d9a48861b38797818c819e1350beb87582b22b840cb290fe2cc736f62ee4e375941f3fbca5
-
SSDEEP
6144:PbVswff0hvZrA2WfPsGfdFqfH5sI8Y6VUbqSKJXi9I1+LIr0pp9fY8K/4Tgu:PbVstZIfPsGSBNbqSKJXi9I1+hdKQTgu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1380 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Executes dropped EXE 1 IoCs
pid Process 1380 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1380 9031fbf2a38a2a986f3426db6c58e3f7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1380 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe 28 PID 2992 wrote to memory of 1380 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe 28 PID 2992 wrote to memory of 1380 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe 28 PID 2992 wrote to memory of 1380 2992 9031fbf2a38a2a986f3426db6c58e3f7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9031fbf2a38a2a986f3426db6c58e3f7.exe"C:\Users\Admin\AppData\Local\Temp\9031fbf2a38a2a986f3426db6c58e3f7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\9031fbf2a38a2a986f3426db6c58e3f7.exeC:\Users\Admin\AppData\Local\Temp\9031fbf2a38a2a986f3426db6c58e3f7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5a4aeddeb3548ff5824020178cc98d875
SHA1f534f7d7b4714e375c3031b46b2a011f0611462b
SHA2566169662fe793e1654293e0c5a05e8c4d61ce9987c050145dd1db33dbb51f4164
SHA5124cb74920e85db64a903f911835fc4714e9a5cd1f27a45a8d799c3f418079bbba9e895b9fee6afcd0507900d501da14893f5e7b2337d82332bd6424e75b8e9ed4