Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 18:33

General

  • Target

    0c23b587ad3edf20d0aee9a5fca3d1e5.exe

  • Size

    145KB

  • MD5

    0c23b587ad3edf20d0aee9a5fca3d1e5

  • SHA1

    c15d4e0370960cbd2778982fd69e8614f8596f09

  • SHA256

    f00a0c7fae30756d97f1f87a5811ecfba0c8802fd8e7cdc51e7c2664dd24ac60

  • SHA512

    b29d28d1154ebe63e9f4682ef496e3cb7b74168a2713bc332a5b194f943fbaffc79dfbfa0a1c95feb65fa9654a14b3dc72e1556caef9c7d6c0d7c65bc039016e

  • SSDEEP

    3072:pLqIFSN3057H5d3vH8ve2gorebdAmNLQcqCdIuAuzA/oVXJkE1:pLpFrN5xEvjx8pLQ9C6uXc/w5kU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c23b587ad3edf20d0aee9a5fca3d1e5.exe
    "C:\Users\Admin\AppData\Local\Temp\0c23b587ad3edf20d0aee9a5fca3d1e5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\72b8ce8437c1dacd8d4310f40f8ad214.bat
      2⤵
      • Deletes itself
      PID:2880

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\72b8ce8437c1dacd8d4310f40f8ad214.bat

          Filesize

          209B

          MD5

          93c736954642dd697da87c0c061c6467

          SHA1

          c341dae712f18a8ba5d2efd70896dde71726a825

          SHA256

          23374c5e9685bd7ec71d353b522ff90bfa0332ab8667fd56975dde172603ce2b

          SHA512

          695c2544fb644d350f2d6e9c88f2a8b0b4abd0127ef76fa1370eb3163e9d2cfc1f1ef3962da104e9751c57b0a12fc6be2a26f5b3873afcb4d452cad80d347bb5