Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 19:45

General

  • Target

    0e8d408335abb38e6adb566af91361ae.exe

  • Size

    57KB

  • MD5

    0e8d408335abb38e6adb566af91361ae

  • SHA1

    d794ed3ffd88dbbc05d86cf8afe6b2ae2a969a78

  • SHA256

    97cb2fcf3c31cada5dc14f959107a2cb47ec7f3d7ae8640b9ac4a5786ac3a015

  • SHA512

    6d904366fb7c099bedda04336b45472c99a82e4883b026df9d3b05251112639c8752bd72f7c06ae80b51ba656d3e34f497c2f81ebe327c8ada6cbbd6b31c91f6

  • SSDEEP

    1536:4K50x04+EeYWIWcih5+hJ030MR74wCv89RUEHU:9fXY/YhUn030q74pvkRvHU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe
    "C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe
      C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3020

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe

          Filesize

          57KB

          MD5

          2012eb044200c728795008a65bf5502c

          SHA1

          b69bd74169faeba7089b70215907fb6945a5ce37

          SHA256

          64182bf1d1aca19cb172faee7d49e076755f6587774b6b3ece354bf852f00510

          SHA512

          8ce1958999365e96e56373485f70801e88c0bbe886ab5b0c1b8f5b6805eccb8306f0790a2715f7415e78f98f7029b5d7a41273beb1a7ca7721c74005c217a685

        • memory/2112-0-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2112-1-0x00000000002E0000-0x000000000030C000-memory.dmp

          Filesize

          176KB

        • memory/2112-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2112-12-0x0000000000310000-0x000000000033C000-memory.dmp

          Filesize

          176KB

        • memory/2112-15-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3020-17-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3020-18-0x0000000000140000-0x000000000016C000-memory.dmp

          Filesize

          176KB

        • memory/3020-23-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3020-28-0x0000000000190000-0x00000000001AB000-memory.dmp

          Filesize

          108KB

        • memory/3020-29-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB