Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 10:52
Static task
static1
Behavioral task
behavioral1
Sample
18a7f987ba78b7d941e85dc001275d3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18a7f987ba78b7d941e85dc001275d3f.exe
Resource
win10v2004-20231215-en
General
-
Target
18a7f987ba78b7d941e85dc001275d3f.exe
-
Size
744KB
-
MD5
18a7f987ba78b7d941e85dc001275d3f
-
SHA1
78bcb4667416e6181499f1ac478e0802a91e16d8
-
SHA256
9625e2ab61630c83f38e3b292c5e21e2302208658ffc1faa38846579bc02e234
-
SHA512
aa07e35f79729571b97c48a52206de05e5ba40a503b5cc9ba4d96945d70543a207d7e10cf0f6b943fcdc1556e99b9c95933ad33bfdc2f4f1bf53dc96dc91a7d9
-
SSDEEP
12288:uaHc64b888888888888W888888888889jscV7TdjL47zdU5imqsX3sv33rD+zG/6:F86IIW7uvmQBsHUezG/aYFkJR30F6rpb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 18a7f987ba78b7d941e85dc001275d3f.tmp -
Loads dropped DLL 1 IoCs
pid Process 1052 18a7f987ba78b7d941e85dc001275d3f.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1632 18a7f987ba78b7d941e85dc001275d3f.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17 PID 1052 wrote to memory of 1632 1052 18a7f987ba78b7d941e85dc001275d3f.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a7f987ba78b7d941e85dc001275d3f.exe"C:\Users\Admin\AppData\Local\Temp\18a7f987ba78b7d941e85dc001275d3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\is-2N9V0.tmp\18a7f987ba78b7d941e85dc001275d3f.tmp"C:\Users\Admin\AppData\Local\Temp\is-2N9V0.tmp\18a7f987ba78b7d941e85dc001275d3f.tmp" /SL5="$400EC,371795,121344,C:\Users\Admin\AppData\Local\Temp\18a7f987ba78b7d941e85dc001275d3f.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb