Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
a58a331eb35ed202ac5d706571dac756.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a58a331eb35ed202ac5d706571dac756.exe
Resource
win10v2004-20231215-en
General
-
Target
a58a331eb35ed202ac5d706571dac756.exe
-
Size
1.9MB
-
MD5
a58a331eb35ed202ac5d706571dac756
-
SHA1
9c60af8b2d2b98719c6840628c51a5b13c3cc752
-
SHA256
36d18ea06593f69af0ba40c640258c415ef14d28e6db8854f914ffa84c44ccd5
-
SHA512
01b3d1601a597a9c98e2ca215b0f150d9ac0be428116cf8ce472e866d0ab3c303db0fdde96884c790820b43fbeee5556fe7f11941deec8e72f2be359527669f4
-
SSDEEP
49152:Qoa1taC070duADsyPezoKS1QGCMQjBNDIHcsuL7Ct:Qoa1taC0RusUezfpnBNDIHRuLWt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 5A12.tmp -
Executes dropped EXE 1 IoCs
pid Process 2284 5A12.tmp -
Loads dropped DLL 1 IoCs
pid Process 1504 a58a331eb35ed202ac5d706571dac756.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2284 1504 a58a331eb35ed202ac5d706571dac756.exe 28 PID 1504 wrote to memory of 2284 1504 a58a331eb35ed202ac5d706571dac756.exe 28 PID 1504 wrote to memory of 2284 1504 a58a331eb35ed202ac5d706571dac756.exe 28 PID 1504 wrote to memory of 2284 1504 a58a331eb35ed202ac5d706571dac756.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a58a331eb35ed202ac5d706571dac756.exe"C:\Users\Admin\AppData\Local\Temp\a58a331eb35ed202ac5d706571dac756.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a58a331eb35ed202ac5d706571dac756.exe BE3F3C680A7449E8DA3D63859E72980D2C89BA2A49CEC4DCADBCE3B44B9B768394537A0902563CF7B17238E7448A05B85B76CEFBFC3D0A5BEE07A1537B6133142⤵
- Deletes itself
- Executes dropped EXE
PID:2284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD55e6025bc6a8597f8f57f2941e3483e7f
SHA18d6873883e3a4e0c86df90ac0a42aa1f97b24b6c
SHA256ec4c73d1e830f9be1f69b4140e25b57772c797564d9d9b9b14cd3f8544656f90
SHA512f5cda868c717cf46d561e31731026752ca8c536dbdc40ee18fd2101d014c319c622994c307995feb908113b9a73cd318e687f962187806bdae40ca81f3ed3ff9
-
Filesize
883KB
MD50644a391de0f4084332497d60d14dfe5
SHA1acb226e1b770288325ae8ac2463778dc39cc63ea
SHA256a4c8991d7d7a07b8c44c6be6c76ddcd858b1354eb5d10ef5c671a6b05065ca1d
SHA5129e9fcb5a2440d6c0cd3cb74b66df174cc858f88ef9af5489473bdf757a99aa05e0afb4f93c1317e53ea9c3dedd63d0ee71bbc775f83cea3964fbaca3e0dd4758