Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:15
Static task
static1
Behavioral task
behavioral1
Sample
18b9d55d0669a55e0ca200a70666458b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18b9d55d0669a55e0ca200a70666458b.exe
Resource
win10v2004-20231215-en
General
-
Target
18b9d55d0669a55e0ca200a70666458b.exe
-
Size
1.2MB
-
MD5
18b9d55d0669a55e0ca200a70666458b
-
SHA1
1f10e348afe8b9f918419ce61cfed74e86dc9ad6
-
SHA256
5b915d19bd0c1f48662d5e0803ef4c62ebf228cf4c3bda2d14baea2eb2d302e9
-
SHA512
1f43daf32d3e32646a5b81dc9ad9424ee3e75246e9c02744633cad6ae6a91fbb775fcee2625eca5050e7b5d3758be4653cdf9b98e13e2a6dcd2dc2e81b3c2cd5
-
SSDEEP
24576:q3yoSlTpSBzeK8fK6+ztuAmJ2HvMQ9WesRnNydyZ/D9kqtZaTO:FF0CKlMcMQ5IbHZ6O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 18b9d55d0669a55e0ca200a70666458b.tmp -
Loads dropped DLL 3 IoCs
pid Process 1696 18b9d55d0669a55e0ca200a70666458b.exe 2156 18b9d55d0669a55e0ca200a70666458b.tmp 2156 18b9d55d0669a55e0ca200a70666458b.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 18b9d55d0669a55e0ca200a70666458b.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28 PID 1696 wrote to memory of 2156 1696 18b9d55d0669a55e0ca200a70666458b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18b9d55d0669a55e0ca200a70666458b.exe"C:\Users\Admin\AppData\Local\Temp\18b9d55d0669a55e0ca200a70666458b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\is-1FG74.tmp\18b9d55d0669a55e0ca200a70666458b.tmp"C:\Users\Admin\AppData\Local\Temp\is-1FG74.tmp\18b9d55d0669a55e0ca200a70666458b.tmp" /SL5="$40016,792541,114176,C:\Users\Admin\AppData\Local\Temp\18b9d55d0669a55e0ca200a70666458b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3