Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 15:15
Static task
static1
Behavioral task
behavioral1
Sample
d5843fac877eccd550e0e12e34182d3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d5843fac877eccd550e0e12e34182d3b.exe
Resource
win10v2004-20231215-en
General
-
Target
d5843fac877eccd550e0e12e34182d3b.exe
-
Size
1.9MB
-
MD5
d5843fac877eccd550e0e12e34182d3b
-
SHA1
27bd4bb838d9c74a1408f4fd4a820c1a963f8433
-
SHA256
0b3436e9e5ca462620431575b5fabbc44aff7eab8730a0aa7da38c4c720ea80c
-
SHA512
d5c9b9a1c002fd6e233aef466355d3d7fab76eba9231a265db0986699fcbd6da9fe7425f74cfa45febdecc0e77e74f34cf936d306e1d8e27f11aa9b085d59dd7
-
SSDEEP
49152:Qoa1taC070dZwPr2JLzPPN9yZ5yMlCZ6NDXGAmXzx72:Qoa1taC0mwPSh34cM1NbGAmXo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1912 13BF.tmp -
Executes dropped EXE 1 IoCs
pid Process 1912 13BF.tmp -
Loads dropped DLL 1 IoCs
pid Process 2956 d5843fac877eccd550e0e12e34182d3b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1912 2956 d5843fac877eccd550e0e12e34182d3b.exe 28 PID 2956 wrote to memory of 1912 2956 d5843fac877eccd550e0e12e34182d3b.exe 28 PID 2956 wrote to memory of 1912 2956 d5843fac877eccd550e0e12e34182d3b.exe 28 PID 2956 wrote to memory of 1912 2956 d5843fac877eccd550e0e12e34182d3b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5843fac877eccd550e0e12e34182d3b.exe"C:\Users\Admin\AppData\Local\Temp\d5843fac877eccd550e0e12e34182d3b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\13BF.tmp"C:\Users\Admin\AppData\Local\Temp\13BF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d5843fac877eccd550e0e12e34182d3b.exe 65925B8D425C9ED1A38D48D7AF7B2300D00B1583AFFAC801969A29B4CCED6A2942A83C3C7E4C1FE7293F438A683AC8DA02960C74D7CB13B0B8FDF3F81EEAD87A2⤵
- Deletes itself
- Executes dropped EXE
PID:1912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD54a4dc9848256ea3f34143ee6f8c07b01
SHA158a84c923bae023d3e9e98e2a6827a032d8cbcec
SHA256fcf806e02b104d05c8ea1a6169f33fbda8bbac65b60eb7dbc9085dd803807fee
SHA512ae44c5b0b2db2c96299957d5afa27e5ddd59fe61af3044b5c0fe69d6b4eb736a6c24666f8df86be65fdea14535c9dee9b148f8e2625aa5c290708db2e63d17c4