Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:27

General

  • Target

    494197af99fcdbebe112c5982c651251.exe

  • Size

    927KB

  • MD5

    494197af99fcdbebe112c5982c651251

  • SHA1

    eb68a46c35ee955b68a02e889000ab5e5bcb8bbf

  • SHA256

    5a441a1611f1edef3d600b2893ed43180159c33f465279d2b2bc8217adbc3070

  • SHA512

    4b71b1527c39198cd894aa049707abc4c27ce1b3800f7c2c2520395aa2e296895b3911420bfbd52eb40318aea3a5b225b554ba3f1e3cb9859a8b625e19e1bc91

  • SSDEEP

    6144:XDtbVPs8QmbXgMlzV40saiigCD4H2cHwXWNzDkYV:RJs8Qmr3VQ5zCD4TyWN9V

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe
    "C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe
      C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2680

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe

          Filesize

          927KB

          MD5

          70f230f41a3e734eb8fd017b062045ee

          SHA1

          76c5f75e71153aa722a8dbc356cab6f214128dd7

          SHA256

          16daace1149b4ca07bba4c9fd0f17b0aa67d5b84d7c3ee58495220466596a1cd

          SHA512

          28f240482328b24115a97a553fe23e645e0cb6dd56e142ecfd85067f337559df660a808cc4ff132ea0d744f27696c697ca650fc905e2cf980247b5f06f6c3f5f

        • \Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe

          Filesize

          128KB

          MD5

          c8bd8fb98a97d2f228a0e833613ec348

          SHA1

          1148a3036de9472debb9937b50a893137a02f55b

          SHA256

          9d02ed185f9f51664e87ef97c3add69fe11283644e8dbfde36c92a6cdcb27935

          SHA512

          2748ee82853f8b38774e832223e268e9da11efbf3ea91e7769fe6c599374f4a8594bbb5c032b8231a94d5a4d63e2497d03d367230f5703e92d45f5157030ff48

        • memory/2680-11-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/2680-12-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2680-17-0x00000000001B0000-0x00000000001E7000-memory.dmp

          Filesize

          220KB

        • memory/2960-0-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/2960-5-0x0000000000130000-0x0000000000167000-memory.dmp

          Filesize

          220KB

        • memory/2960-9-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB