Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
ea11d42e822265388a3ee9309823403b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea11d42e822265388a3ee9309823403b.exe
Resource
win10v2004-20231215-en
General
-
Target
ea11d42e822265388a3ee9309823403b.exe
-
Size
1.9MB
-
MD5
ea11d42e822265388a3ee9309823403b
-
SHA1
883ac16980fba75b3056586e1b513155605ab88c
-
SHA256
ce29a4d904c8a85c624006e67786e51e476ef03611d231c7dd3302fc0713592b
-
SHA512
b2ef07c4fca44fa862f70341d95c93ace18588b3128fa2c619eecce5a52b9deb41b8d655aa48ad47c9c30a09770676dfcec988bcab577a52129a82aa9d340df8
-
SSDEEP
49152:Qoa1taC070dJcz9vQR8UOIvsXMmZ83t3mwQb5S:Qoa1taC0Vz9vQRvOI08mGdm7VS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2876 602A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2876 602A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2088 ea11d42e822265388a3ee9309823403b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2876 2088 ea11d42e822265388a3ee9309823403b.exe 28 PID 2088 wrote to memory of 2876 2088 ea11d42e822265388a3ee9309823403b.exe 28 PID 2088 wrote to memory of 2876 2088 ea11d42e822265388a3ee9309823403b.exe 28 PID 2088 wrote to memory of 2876 2088 ea11d42e822265388a3ee9309823403b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe"C:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\602A.tmp"C:\Users\Admin\AppData\Local\Temp\602A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe FBA56FBB02116581DEEE6E2FD37C024F55D92D3C0C3BFB75E52A9173A6735FD2ED330DE9B7A543BE96B923B27CEA0FC120D1F9A67D5ED8B715484DC2C1A99BB52⤵
- Deletes itself
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5c1113ca2c79d56e70bb5cc06c3198605
SHA1fa8f6a2034f67f182d7ec4374cea2b3692de9317
SHA25626011d903bbadbf2b1751f7e3cf6bb168896e157fdb3ac481b0b7bba71e50b64
SHA512e8a43c0fb834ab3f2e92cd93649107ddb9fd02a912a6ca3c894048aedfe64448cca01263e85fda9174e1f55713bd57e81049c6e815ac27a95379ba3b3464efd9
-
Filesize
640KB
MD540d8bae0cfdb375431fa32bb1ecc4867
SHA11466a74c64d0e79c0c73282ac301c7d520f0fb3c
SHA256b3dc0efdf9aefc418175636a2e38a0a3c85a364c6ff7db0fd49d94323b16ad61
SHA51235717e4c55d447c319cb4c7cd2429bac03903550ee7ed53cce642565a72dcdb6c193deb966b82299f927bdb59837ecdb4af8352d15ea90ef0ad4488841e1ec9c