Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 16:10

General

  • Target

    ea11d42e822265388a3ee9309823403b.exe

  • Size

    1.9MB

  • MD5

    ea11d42e822265388a3ee9309823403b

  • SHA1

    883ac16980fba75b3056586e1b513155605ab88c

  • SHA256

    ce29a4d904c8a85c624006e67786e51e476ef03611d231c7dd3302fc0713592b

  • SHA512

    b2ef07c4fca44fa862f70341d95c93ace18588b3128fa2c619eecce5a52b9deb41b8d655aa48ad47c9c30a09770676dfcec988bcab577a52129a82aa9d340df8

  • SSDEEP

    49152:Qoa1taC070dJcz9vQR8UOIvsXMmZ83t3mwQb5S:Qoa1taC0Vz9vQRvOI08mGdm7VS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe
    "C:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\602A.tmp
      "C:\Users\Admin\AppData\Local\Temp\602A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ea11d42e822265388a3ee9309823403b.exe FBA56FBB02116581DEEE6E2FD37C024F55D92D3C0C3BFB75E52A9173A6735FD2ED330DE9B7A543BE96B923B27CEA0FC120D1F9A67D5ED8B715484DC2C1A99BB5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\602A.tmp

    Filesize

    536KB

    MD5

    c1113ca2c79d56e70bb5cc06c3198605

    SHA1

    fa8f6a2034f67f182d7ec4374cea2b3692de9317

    SHA256

    26011d903bbadbf2b1751f7e3cf6bb168896e157fdb3ac481b0b7bba71e50b64

    SHA512

    e8a43c0fb834ab3f2e92cd93649107ddb9fd02a912a6ca3c894048aedfe64448cca01263e85fda9174e1f55713bd57e81049c6e815ac27a95379ba3b3464efd9

  • \Users\Admin\AppData\Local\Temp\602A.tmp

    Filesize

    640KB

    MD5

    40d8bae0cfdb375431fa32bb1ecc4867

    SHA1

    1466a74c64d0e79c0c73282ac301c7d520f0fb3c

    SHA256

    b3dc0efdf9aefc418175636a2e38a0a3c85a364c6ff7db0fd49d94323b16ad61

    SHA512

    35717e4c55d447c319cb4c7cd2429bac03903550ee7ed53cce642565a72dcdb6c193deb966b82299f927bdb59837ecdb4af8352d15ea90ef0ad4488841e1ec9c

  • memory/2088-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB