Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 01:05

General

  • Target

    1f24efd69a9a3ace95b9ad1f9d910eb0.exe

  • Size

    102KB

  • MD5

    1f24efd69a9a3ace95b9ad1f9d910eb0

  • SHA1

    ae31fdb6e25def2bfef45117b221bca6eb3806f5

  • SHA256

    034a4b440039c56c1218b25bb18e9394a5c88afe453b6a8c00abb22ab586c966

  • SHA512

    15a67ffdf061d95509b0cd164ec764c1cf89d4cabedaa870d3bb1ed9dbafbd98634731de07d3d9bd8fe09b4748b3dc3cbc5b8483473181046154442567a6c2e3

  • SSDEEP

    1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfPwYpEfEWQYx3vir:v7DhdC6kzWypvaQ0FxyNTBfPSRx6Rp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f24efd69a9a3ace95b9ad1f9d910eb0.exe
    "C:\Users\Admin\AppData\Local\Temp\1f24efd69a9a3ace95b9ad1f9d910eb0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\17F4.tmp\17F5.tmp\17F6.bat C:\Users\Admin\AppData\Local\Temp\1f24efd69a9a3ace95b9ad1f9d910eb0.exe"
      2⤵
        PID:2868

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\17F4.tmp\17F5.tmp\17F6.bat

            Filesize

            10KB

            MD5

            110abecaca05ea61129e7df64eed1fcc

            SHA1

            fd7cafdefb883a109a7279fdd0d7e7be6411f119

            SHA256

            2ba8ecec684fedc75e45777ab0c5c18926075b980b972916cb0f750339d2cff1

            SHA512

            3138222da86c08ba7ece4bad6be63caf96ceedd96fc5cb00b2c10258588d3f675f228a6cb5d78216f42cc5da9436e9ea9cbfc61519b1bf33ba6a1dd0513e9a8e