Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:03
Static task
static1
Behavioral task
behavioral1
Sample
96618ef1d1429f730d5dc95ce12e915c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96618ef1d1429f730d5dc95ce12e915c.exe
Resource
win10v2004-20231215-en
General
-
Target
96618ef1d1429f730d5dc95ce12e915c.exe
-
Size
1.9MB
-
MD5
96618ef1d1429f730d5dc95ce12e915c
-
SHA1
e083acb34afddb0f328167e737be4f827dde2ac2
-
SHA256
97ff50f0a9cf52a5942f47780c0edf5615824cd2d92e78119cb2b712989f33ba
-
SHA512
6691070f8d0d45b0c92ac90f3b0935c1395968c621f7d177aedd31fa4116844db176e5bb54316b2a5b4bc9a85d2787b8df8b2c20da466d16b8761b015ee3dab1
-
SSDEEP
49152:Qoa1taC070d/oYeyP19MppC+IjXsI0cgkGKE:Qoa1taC0Uey7M/5O/E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 6ECA.tmp -
Executes dropped EXE 1 IoCs
pid Process 2124 6ECA.tmp -
Loads dropped DLL 1 IoCs
pid Process 1064 96618ef1d1429f730d5dc95ce12e915c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2124 1064 96618ef1d1429f730d5dc95ce12e915c.exe 28 PID 1064 wrote to memory of 2124 1064 96618ef1d1429f730d5dc95ce12e915c.exe 28 PID 1064 wrote to memory of 2124 1064 96618ef1d1429f730d5dc95ce12e915c.exe 28 PID 1064 wrote to memory of 2124 1064 96618ef1d1429f730d5dc95ce12e915c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\96618ef1d1429f730d5dc95ce12e915c.exe"C:\Users\Admin\AppData\Local\Temp\96618ef1d1429f730d5dc95ce12e915c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\6ECA.tmp"C:\Users\Admin\AppData\Local\Temp\6ECA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\96618ef1d1429f730d5dc95ce12e915c.exe 0CB87B5954A379ED58D5476C07DB33429E5B6C9BC6C723F79ADB8984B13C28388F1567FF2475430D74D70AB3C5F581824C58949817A66147490E9E8C0C9F24402⤵
- Deletes itself
- Executes dropped EXE
PID:2124
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d9146043dc1db303259a5b03fb993aa2
SHA122dfcc819528484591d23de38b1ff012ce541ded
SHA2565c1092a8e79e3832f2efed6acdefa06963f8a63cc4d5420847ee877d9a015c75
SHA512d73d3e7f5fa08954c9e4581885dc5dda36fa7e1397b55f7578159089a1edcc1f59b78dd61dee25c1848d7d46415f25157997baf1f2f7e5d382e8fd0334cfbfe0