Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 01:24
Behavioral task
behavioral1
Sample
2f8bcb46f3bb005735ac43145c4ea5d4.exe
Resource
win7-20231215-en
General
-
Target
2f8bcb46f3bb005735ac43145c4ea5d4.exe
-
Size
14.4MB
-
MD5
2f8bcb46f3bb005735ac43145c4ea5d4
-
SHA1
4d1a2e3d7f534ea0f55f575b15a17b1202fc0842
-
SHA256
02bcdd66f3f5ad00ba19e2866a29b694340793a80506c79c05e0bbb12a113540
-
SHA512
7013cc601c439edb130992245ea7f907268d8afad8165ac0e996590451ed6b4156eef598121485b06e3916fb0801c2ccd3e28861d699f05e7329e622d07b0a1e
-
SSDEEP
393216:JiIE7YoPQ6dQuslSq99oWOv+9fgxEmmUa1EaW:W7rPQ6dQuSDorvSYxNmNE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1780 2f8bcb46f3bb005735ac43145c4ea5d4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1780 1984 2f8bcb46f3bb005735ac43145c4ea5d4.exe 27 PID 1984 wrote to memory of 1780 1984 2f8bcb46f3bb005735ac43145c4ea5d4.exe 27 PID 1984 wrote to memory of 1780 1984 2f8bcb46f3bb005735ac43145c4ea5d4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f8bcb46f3bb005735ac43145c4ea5d4.exe"C:\Users\Admin\AppData\Local\Temp\2f8bcb46f3bb005735ac43145c4ea5d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\2f8bcb46f3bb005735ac43145c4ea5d4.exe"C:\Users\Admin\AppData\Local\Temp\2f8bcb46f3bb005735ac43145c4ea5d4.exe"2⤵
- Loads dropped DLL
PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989