Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
0751c6cd12d9c8466fc8047325f43a63.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0751c6cd12d9c8466fc8047325f43a63.exe
Resource
win10v2004-20231222-en
General
-
Target
0751c6cd12d9c8466fc8047325f43a63.exe
-
Size
1.9MB
-
MD5
0751c6cd12d9c8466fc8047325f43a63
-
SHA1
064770a0ce2b57e6da68209e1cdb6460981dd640
-
SHA256
47609fbc0d0a086a7ccb440c1c406eb7c4c02e8ff44b1acbae76a93a4985ba40
-
SHA512
41f4ffe889ed18ef393526b0123e0f2475bcb5579e2da36cc88569de6e79809773ba777d702c5a185ceb1b3879c214ef404cd9a7353cd2ef2bc55ff26d454633
-
SSDEEP
49152:Qoa1taC070dcmuGMtVDXUcSvXHuyr517Q6G260tlU2:Qoa1taC0rmuGM/6vXHuM5G6GT0tq2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 9D0.tmp -
Executes dropped EXE 1 IoCs
pid Process 2160 9D0.tmp -
Loads dropped DLL 1 IoCs
pid Process 2900 0751c6cd12d9c8466fc8047325f43a63.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2160 2900 0751c6cd12d9c8466fc8047325f43a63.exe 28 PID 2900 wrote to memory of 2160 2900 0751c6cd12d9c8466fc8047325f43a63.exe 28 PID 2900 wrote to memory of 2160 2900 0751c6cd12d9c8466fc8047325f43a63.exe 28 PID 2900 wrote to memory of 2160 2900 0751c6cd12d9c8466fc8047325f43a63.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe"C:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\9D0.tmp"C:\Users\Admin\AppData\Local\Temp\9D0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0751c6cd12d9c8466fc8047325f43a63.exe 224AE8A4A83DCD31974DCEDFB6EF708450E38E132B4B0D5727BBC5C4AA4D5C4FD47F5B99489CF310250FECBEB7554F2B87C840038725C8BD27E5C0727A5AC2F02⤵
- Deletes itself
- Executes dropped EXE
PID:2160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5c6ff6656748fc82dbf85a6b5f0f395a6
SHA1ba41f73b4d884bfd76d7f64408c4a5af5f1c53aa
SHA256c7ec720938e6edc05bced269a1286c41019447bbee5d36ca05d5f881d745c053
SHA5125a4b5e5b11c4f1c24f7c15dd3ddf3bd36847b223253846498a4bcd3a1ac4c5de6eced45bc7ce38d9e3f0ee62db42871d31bd6d273750b1efee75b7bdade6aaf3
-
Filesize
1024KB
MD53f3105a3aea58e91a61571f37b722575
SHA18f414a96fbbad8a0731d5af779e995124024158c
SHA256e1f0685898f856f8a76cbea241a7005f7071a2d000f50f5c07852ecf0f646682
SHA512690a41221f77cb5337de2a67b82d414eb0a5e990f76750d961aa54fd0e3a4a907ba357e41ac737d5436fb3534930b9fa99a21565363149c2f177493bc0566614