Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:33
Static task
static1
Behavioral task
behavioral1
Sample
070ac96e10a1a56582e8d0a4963eef5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
070ac96e10a1a56582e8d0a4963eef5d.exe
Resource
win10v2004-20231222-en
General
-
Target
070ac96e10a1a56582e8d0a4963eef5d.exe
-
Size
656KB
-
MD5
070ac96e10a1a56582e8d0a4963eef5d
-
SHA1
b4042df35cbf7f6efd319032d9d2d622fcc955ae
-
SHA256
6237699a84321148e04f9840727079bbd103a6a212250339a84c1b44d8aa8ae8
-
SHA512
a89812ad8c5e6a1204bce6bcd366ec29c5c77d16177e406693e68aecf650932c8e3cb1877034ac5bd142d201b4f35a2fd23b769582beb3d2e2315699fd283a89
-
SSDEEP
12288:5na9wieRlatDR16XgDVxOENi/7lppTB/Gd1vNLbHtcvS38LCJQBtdGs1rBLsJ:5naukGX8OENiTl/B/YNkS3rJQBtUkBgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp -
Loads dropped DLL 5 IoCs
pid Process 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 070ac96e10a1a56582e8d0a4963eef5d.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13 PID 2436 wrote to memory of 2128 2436 070ac96e10a1a56582e8d0a4963eef5d.exe 13
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-1UUNF.tmp\070ac96e10a1a56582e8d0a4963eef5d.tmp"C:\Users\Admin\AppData\Local\Temp\is-1UUNF.tmp\070ac96e10a1a56582e8d0a4963eef5d.tmp" /SL5="$4010A,396412,54272,C:\Users\Admin\AppData\Local\Temp\070ac96e10a1a56582e8d0a4963eef5d.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2128
-
C:\Users\Admin\AppData\Local\Temp\070ac96e10a1a56582e8d0a4963eef5d.exe"C:\Users\Admin\AppData\Local\Temp\070ac96e10a1a56582e8d0a4963eef5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5593ea6ed033d1f21c950ca66b1c5d299
SHA15cfb9400972aaaef2f31e85d42b37078019bbf8b
SHA2561bd68dc6c83cf34ad7e73eeb799e8b9d3a9c27fb0e071fadf937b101e036bcfb
SHA5126a2486bcaa100c69923812c00bf09f5627ca93becbabf6f33aacbdff83cd93fb6a47e684e27e47cc0a2ca249f3e1001a437934d183cf46d1fbd2416aa46c63fc
-
Filesize
315B
MD58e21d830f99d2417cfbecb7ed49535ca
SHA165b5526e236897f7e189c0656c9c58e639a57b99
SHA256eea90cac652f7a5ca119b6ff71e1e0e82c20343a6efceb669a9fc09f15641831
SHA5122c9d9fadf57f6a0cb5342ca4c3cf6001370dc8bf5bd3a47a2aa82b07daf746b92dbe033d642d55c2679bd05c672ae9bc935163a3ffedc2b1b487f94990b365fb
-
Filesize
113KB
MD5dd20b97e4c93365991898f306b5c23b7
SHA1da924a8ae364766f3556374006d5e4b20966d0e0
SHA2564d8629b5f9cf13619406606bedc8a196d557b19d7d1ebd48daddb3c072df85ac
SHA5120a8b206c64015f6f10f90c9589254110b088b66b990192825d0378d599258980be70f503595a3cee2c005dd2650dd8d98014186fce9bb2882194e92fe3cd4445
-
Filesize
22KB
MD5cd88490f1b8aba914284b853d1fb4e54
SHA1933e74f74cd7a3bd667a650bdc9f31957af5d240
SHA25603821942a38164b3f1101815bf0d541e7489ecc43323d9dd90b5afd380841402
SHA512090e3b42b7fe8f7ab7b2294bbd7fcf5ed803b2865b6ae14e085f163b1266221adf02a8bbe1d695dff73e8b11feacc14e001c8a994762c89e0cc68a933b20dccf
-
Filesize
11KB
MD50b865d1f8fa4140d07d7fb9a027c9463
SHA1431ec77c7171a52b8fa634a2d37979051a18b555
SHA256e629801b7f5e0c99354903cfd9dd315cb59a07fc2205a604bd73a6fe4f431d47
SHA5124b59f73b765ed5de29b984ac7eef27f79e76c4be504671040cd5ddad64a4a03e35f3dce2262fffba0133983537c4bb056d7c11bd977017e80e1af9b1c0b63ed2
-
Filesize
20KB
MD5a07a4c3343329135e2041c537f057e69
SHA1d9c534257093faf68ffa408a6e98acedede3bfa6
SHA2560fb018f82418c4f4775194f3910bf8d8f8a78698783e511e2e62e0ca5c03f54a
SHA5122c67d1a812b13475388eb7368cca24eb34eb72d61c3977da451ec7054e83dabd6167cff2462c5f05966c4ca9039719fa63bc73a471477be6d4e74580d1727142
-
Filesize
64KB
MD567522034c452442dc2d50e4fc3c3809b
SHA1f0ae1dd8040ed94f638b8f6976b32b75cc7b3d0d
SHA256c5d05256a5caa60173b7915810aed97e58a6c5f8121a5c76753d9f8163796a8a
SHA51219577932aad22ff79d1287e4386630c038fd5cbfb3546f99b13f315fe3e25527bf79e5174cf48d62f922231af19ae3c2639441f75f6832e7861b2a28e0e70c62