Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
0f55ddcba102869b4acd2c6790708cf6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f55ddcba102869b4acd2c6790708cf6.exe
Resource
win10v2004-20231215-en
General
-
Target
0f55ddcba102869b4acd2c6790708cf6.exe
-
Size
4.2MB
-
MD5
0f55ddcba102869b4acd2c6790708cf6
-
SHA1
66918d2e84f8c008e99347b92c2a954632ee66c4
-
SHA256
fc9368bc55b74edf670baaf1fd0ccbb1eb5ab0352f88b8a6bef6ee9dd318f503
-
SHA512
5e794ada82810207e7cd1a1316f2a5be2d6311b31801d7726a636996f54a9b1d7019d6694be743aa388df4ffab5273a14b269957dddeddff120418f24a0441ed
-
SSDEEP
98304:6jLx5EXfWvtHarzK7UK2n4SYBOmjbW01bpldeosbEyW:CLxKXfWvNaPG2ZCOgbW0Fp/e/AyW
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2472 0f55ddcba102869b4acd2c6790708cf6.tmp -
Loads dropped DLL 2 IoCs
pid Process 2508 0f55ddcba102869b4acd2c6790708cf6.exe 2472 0f55ddcba102869b4acd2c6790708cf6.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28 PID 2508 wrote to memory of 2472 2508 0f55ddcba102869b4acd2c6790708cf6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f55ddcba102869b4acd2c6790708cf6.exe"C:\Users\Admin\AppData\Local\Temp\0f55ddcba102869b4acd2c6790708cf6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\is-O0H3S.tmp\0f55ddcba102869b4acd2c6790708cf6.tmp"C:\Users\Admin\AppData\Local\Temp\is-O0H3S.tmp\0f55ddcba102869b4acd2c6790708cf6.tmp" /SL5="$30150,3890581,119808,C:\Users\Admin\AppData\Local\Temp\0f55ddcba102869b4acd2c6790708cf6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
1.1MB
MD5d5d303dbabe599c5b4c9b96571d1b599
SHA1265641e6144297bfe761ca3b332349e0d0b7a5b5
SHA256e277bc4cc95eec3a3b1341270f62c12adcf2c6ed666f59f611219e4193d1fe44
SHA512de44eac295721c07c789a1c5862e1522a0c0a73d0a0e6d016de60672fab447e7eae5b7b5ad9ae2be2cadf1d9559cdadc6bd2367a195172305085ab1bc2c683be