Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:04
Static task
static1
Behavioral task
behavioral1
Sample
6d09d484d7ccdad1c341eda09fe69026.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d09d484d7ccdad1c341eda09fe69026.exe
Resource
win10v2004-20231222-en
General
-
Target
6d09d484d7ccdad1c341eda09fe69026.exe
-
Size
247KB
-
MD5
6d09d484d7ccdad1c341eda09fe69026
-
SHA1
2ff7f3dec3de4edf9dc3a3453fdae689cc0ced01
-
SHA256
2c8249b71e4e027717794e5ab0a27a8ce3ae3732e8de32a0d8e1b9acf2c73412
-
SHA512
7b7c5d74fc1710f3bd8f888488337c51964bd9e6020c73ad12d7527d8d84174621b366eab899dc7deb8e385def5d3ee53f8af0099a3adc3727d756f6065c987c
-
SSDEEP
6144:nORGrsbX9LaO7KNGuTmEVmeM3E6Ygf4f+G:nOKea7LYP42
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 maxfilimg.exe -
Loads dropped DLL 6 IoCs
pid Process 2884 6d09d484d7ccdad1c341eda09fe69026.exe 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2392 2884 6d09d484d7ccdad1c341eda09fe69026.exe 28 PID 2884 wrote to memory of 2392 2884 6d09d484d7ccdad1c341eda09fe69026.exe 28 PID 2884 wrote to memory of 2392 2884 6d09d484d7ccdad1c341eda09fe69026.exe 28 PID 2884 wrote to memory of 2392 2884 6d09d484d7ccdad1c341eda09fe69026.exe 28 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29 PID 2392 wrote to memory of 2780 2392 maxfilimg.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d09d484d7ccdad1c341eda09fe69026.exe"C:\Users\Admin\AppData\Local\Temp\6d09d484d7ccdad1c341eda09fe69026.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\maxfilimg\maxfilimg.exeC:\Users\Admin\AppData\Roaming\maxfilimg\maxfilimg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\MAXFIL~1\MAXFIL~1.DLL 0003⤵
- Loads dropped DLL
PID:2780
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD52c1df802c7e5babf835748b4184beea0
SHA1422ef2500d614c11cc7bd666532dee6fa025301e
SHA256fea3141b38fda4d0704bdabd76656087296efa04dba9c64ea3a7f4e41c9cc872
SHA5123e6724391ecb89a98ef230ef313dfea951e3ccc16e77855f73f97afc486823ced10d9f337f3b3cd24145ea47ef31fab2ebdcbacab0761fbad5b5e66086dc243e
-
Filesize
160KB
MD5069b89e63681a1391e8f49d50867f049
SHA1ec2787676bb27215992cd3dbc39ba5ed6d41026b
SHA256756e1c0fd8e00159da74d7e482797b0dd0fc6371b5c38e398c3ffac6614b0c18
SHA5120a9c8bf199bcf5a31b644350f89388547fa5c1a43d88aec8411a17ca7ce33ea86349803bc3c504df595b49a5c44f548febe7102965dcad5f0396ea209c2bdd6d
-
Filesize
247KB
MD56d09d484d7ccdad1c341eda09fe69026
SHA12ff7f3dec3de4edf9dc3a3453fdae689cc0ced01
SHA2562c8249b71e4e027717794e5ab0a27a8ce3ae3732e8de32a0d8e1b9acf2c73412
SHA5127b7c5d74fc1710f3bd8f888488337c51964bd9e6020c73ad12d7527d8d84174621b366eab899dc7deb8e385def5d3ee53f8af0099a3adc3727d756f6065c987c