Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 23:42

General

  • Target

    0751c6cd12d9c8466fc8047325f43a63.exe

  • Size

    1.9MB

  • MD5

    0751c6cd12d9c8466fc8047325f43a63

  • SHA1

    064770a0ce2b57e6da68209e1cdb6460981dd640

  • SHA256

    47609fbc0d0a086a7ccb440c1c406eb7c4c02e8ff44b1acbae76a93a4985ba40

  • SHA512

    41f4ffe889ed18ef393526b0123e0f2475bcb5579e2da36cc88569de6e79809773ba777d702c5a185ceb1b3879c214ef404cd9a7353cd2ef2bc55ff26d454633

  • SSDEEP

    49152:Qoa1taC070dcmuGMtVDXUcSvXHuyr517Q6G260tlU2:Qoa1taC0rmuGM/6vXHuM5G6GT0tq2

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe
    "C:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\9D0.tmp
      "C:\Users\Admin\AppData\Local\Temp\9D0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe 224AE8A4A83DCD31974DCEDFB6EF708450E38E132B4B0D5727BBC5C4AA4D5C4FD47F5B99489CF310250FECBEB7554F2B87C840038725C8BD27E5C0727A5AC2F0
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9D0.tmp

    Filesize

    98KB

    MD5

    c6ff6656748fc82dbf85a6b5f0f395a6

    SHA1

    ba41f73b4d884bfd76d7f64408c4a5af5f1c53aa

    SHA256

    c7ec720938e6edc05bced269a1286c41019447bbee5d36ca05d5f881d745c053

    SHA512

    5a4b5e5b11c4f1c24f7c15dd3ddf3bd36847b223253846498a4bcd3a1ac4c5de6eced45bc7ce38d9e3f0ee62db42871d31bd6d273750b1efee75b7bdade6aaf3

  • \Users\Admin\AppData\Local\Temp\9D0.tmp

    Filesize

    1024KB

    MD5

    3f3105a3aea58e91a61571f37b722575

    SHA1

    8f414a96fbbad8a0731d5af779e995124024158c

    SHA256

    e1f0685898f856f8a76cbea241a7005f7071a2d000f50f5c07852ecf0f646682

    SHA512

    690a41221f77cb5337de2a67b82d414eb0a5e990f76750d961aa54fd0e3a4a907ba357e41ac737d5436fb3534930b9fa99a21565363149c2f177493bc0566614

  • memory/2160-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2900-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB