Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 16:40
Static task
static1
Behavioral task
behavioral1
Sample
f6cb0fecaec769421d785b0e8c5a732a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6cb0fecaec769421d785b0e8c5a732a.exe
Resource
win10v2004-20231215-en
General
-
Target
f6cb0fecaec769421d785b0e8c5a732a.exe
-
Size
1.9MB
-
MD5
f6cb0fecaec769421d785b0e8c5a732a
-
SHA1
af74b22ce57866a80f17530193799495719151b8
-
SHA256
b4541ee1b6d5894950e5bbb76a141c085c5cd5545d39584246c7d775e20cda3a
-
SHA512
94974a9397d52d83f165096877f70caf17c61afba3b3a89009cc02a055c3235148225dd51ce4ec4d82d2b8f136d7318bf4781aa98d4a8ee2f1c849cb4335b860
-
SSDEEP
49152:Qoa1taC070dc16p+UQZZyBZC09fBwjbe03fn3tHJ:Qoa1taC0bplHqB5w/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1736 6181.tmp -
Executes dropped EXE 1 IoCs
pid Process 1736 6181.tmp -
Loads dropped DLL 1 IoCs
pid Process 1092 f6cb0fecaec769421d785b0e8c5a732a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1736 1092 f6cb0fecaec769421d785b0e8c5a732a.exe 28 PID 1092 wrote to memory of 1736 1092 f6cb0fecaec769421d785b0e8c5a732a.exe 28 PID 1092 wrote to memory of 1736 1092 f6cb0fecaec769421d785b0e8c5a732a.exe 28 PID 1092 wrote to memory of 1736 1092 f6cb0fecaec769421d785b0e8c5a732a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6cb0fecaec769421d785b0e8c5a732a.exe"C:\Users\Admin\AppData\Local\Temp\f6cb0fecaec769421d785b0e8c5a732a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\6181.tmp"C:\Users\Admin\AppData\Local\Temp\6181.tmp" --splashC:\Users\Admin\AppData\Local\Temp\f6cb0fecaec769421d785b0e8c5a732a.exe 55DAD1FBCC3ED1BCA10E3A2BA7B13D01BE5B97B85D830DE4CC5A70E83F42D6DD8E1A1F9B5965804E7DFD1E9403B7AF513C1DA23C398A935E40192080B80EDB062⤵
- Deletes itself
- Executes dropped EXE
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
741KB
MD52c40843c7a78647a1c9a2f3bedef2fe1
SHA1127c909a4dd9abebf8b083f9511efb54416640f9
SHA2566ffbd7248f3100529a07642e03d2badc344c5f65ef3ff36f8b3c297a146bcc79
SHA512eb60dad6b805f3720df43dd8896faafbbf8785bd8d1402866c1013e6b0f69e213b939d3443dd5d304dae0870fb4902bcc0512fa66a07b09dce99cc35fc2604e9
-
Filesize
1.3MB
MD545d97d1f1a1f51c3eb97681701f6a578
SHA18cc2a32cb8c67d088d83bb4ae721b3df72aaddc2
SHA2561ad2db9d5417de2576e032c8bf0e92b51b4c5289bd27cecc07d9251e52abef2f
SHA51290fe996cee4f8430f75a23295d331db83f37e138f4de9b3005f9d8c3314e22d7217585add29ca2c9d1e45cbb0690f83a496ab43e8df1dd58018fbb6fb0798c72