Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
0bab740a74196ff8f7ccf174abbccc2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bab740a74196ff8f7ccf174abbccc2f.exe
Resource
win10v2004-20231215-en
General
-
Target
0bab740a74196ff8f7ccf174abbccc2f.exe
-
Size
699KB
-
MD5
0bab740a74196ff8f7ccf174abbccc2f
-
SHA1
8db66b529fdb58dc193efda917b1bafa1bd09372
-
SHA256
76d273786d7b40330741de1ff324cb1814fd56f539a3a914a89e8dc9c9a838e8
-
SHA512
e3a40b2729fb0c6ed9158a5cc2c55718ea62012b6badcae0383819fa9775268a792b326cb0b30e808bc7ad8df9a58ec7e5cdc95c79cac63e4719986561909c88
-
SSDEEP
12288:5na9UiT1nZeco1ujA7mntBnz41dtcvS38LCJQBtdGs1rBLsJ:5naqk3eco+Nj0XkS3rJQBtUkBgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp -
Loads dropped DLL 5 IoCs
pid Process 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 0bab740a74196ff8f7ccf174abbccc2f.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16 PID 1708 wrote to memory of 2404 1708 0bab740a74196ff8f7ccf174abbccc2f.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe"C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\is-1KFH1.tmp\0bab740a74196ff8f7ccf174abbccc2f.tmp"C:\Users\Admin\AppData\Local\Temp\is-1KFH1.tmp\0bab740a74196ff8f7ccf174abbccc2f.tmp" /SL5="$40110,391208,54272,C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2404
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD500c2d81954e5beb5ae18b558fdfe4aa4
SHA184b2bacaf92eb44b709251ddb1900dfbf428a838
SHA2565af945fca2007052746943b522ca8db0d867b50188f4e5d79efdb16292e95214
SHA5125aae8c3d4eb12bfcd896b6c7b9a39f94051d14933806f24183c693e3316f0f13f0c1cdedfc42f3119e9e93b8d70f2e051200cffb09894fa463635bbf32dd02fe
-
Filesize
227B
MD58c06a9539331018aad17acc39146ccc4
SHA1cb48146f36dc1fd3b7bd23f345868191fbbd444a
SHA256a1e2218effdd91dd157f9085acbca3cf289d5b3af13c347830b43e96d7cd5b0e
SHA512063213cd2a4e2394dc266fb3a8813d34efec3af3e404c6f269f9796c52c4756fad7b2d6afb4d3c535cf8b15e6aa381c54d6fd9933a3bcc25d1e1f4e52f4fc2f9
-
Filesize
14KB
MD5155c977bc7375776a23c84b59a7240d6
SHA1d139f1466e704cb034aa71df41d8472e217c7de3
SHA25665e0e96842c23ced8121f2adfc484a6380028a517f8fc2b9acc58a8bdc94d8d0
SHA5123f0b8f6506f9311bcb2bd2c0cb58076be00279fc7ada5461385111fbc691e58056185fb4cd2b92cee40dc8cbbcdc6993024f9a1ddd6c9a429dfa6a4f2be63dc8
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
49KB
MD502ecc74f7f91e9ffd84de708683236a6
SHA13532de0b77df8b0fc89e9c7eddec3fa71f98f5a2
SHA25630ad8a0e1cee091ca48c771adb2e76baf1a7d54b9f60dc47f54dfdc2d6f6691e
SHA512a3fdaa651f82428395bc412a2a04fce673768d3ef088b3748addf337d95464eb141ae7c286bff5c705eae05dd7b38207629588ae7e89ada15269463cd7acf541
-
Filesize
27KB
MD585e430d7f94a89d1ad012efb3c82e6da
SHA1d041e16edf32c783d96c3785de305b60eaf63d65
SHA2569a4f5248323eded4b992de90edf0c4afd02deb8b8eec9c21b24229f714120d11
SHA512483e57a181994939863b98b5b05ce69230c095e9dd83090a544f9db7c0a6aa336376ecc8089637ee50f8537e6d07338f2591a83fd750756446a2e7cdef79781d