Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:28
Static task
static1
Behavioral task
behavioral1
Sample
0077425778cda31d01c97a6aa0c06fee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0077425778cda31d01c97a6aa0c06fee.exe
Resource
win10v2004-20231215-en
General
-
Target
0077425778cda31d01c97a6aa0c06fee.exe
-
Size
82KB
-
MD5
0077425778cda31d01c97a6aa0c06fee
-
SHA1
4c68e5217bfb59173e8bfc1466772c783f9945f2
-
SHA256
717b106e8d55120e09b4011651f8f1faba6bc1f54c7f3894baaaeb8118043cf9
-
SHA512
23a48f006a03c0dd3ad17d07d8a3e7dbc9b4523ede221910279f8309ae6036a19b8f6d2b446d6f46a78aa9dce55bd724e9d9b65619c0267ed3cff89febd14f4f
-
SSDEEP
1536:24Ec6mlGplwra2VDzORU3FOPia6S3q8VtzFaXXgB2X+hA85tI:24MblwrHG61Or6mHJaXUHA8I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2664 0077425778cda31d01c97a6aa0c06fee.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 0077425778cda31d01c97a6aa0c06fee.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 0077425778cda31d01c97a6aa0c06fee.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2432 0077425778cda31d01c97a6aa0c06fee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2432 0077425778cda31d01c97a6aa0c06fee.exe 2664 0077425778cda31d01c97a6aa0c06fee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2664 2432 0077425778cda31d01c97a6aa0c06fee.exe 29 PID 2432 wrote to memory of 2664 2432 0077425778cda31d01c97a6aa0c06fee.exe 29 PID 2432 wrote to memory of 2664 2432 0077425778cda31d01c97a6aa0c06fee.exe 29 PID 2432 wrote to memory of 2664 2432 0077425778cda31d01c97a6aa0c06fee.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0077425778cda31d01c97a6aa0c06fee.exe"C:\Users\Admin\AppData\Local\Temp\0077425778cda31d01c97a6aa0c06fee.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\0077425778cda31d01c97a6aa0c06fee.exeC:\Users\Admin\AppData\Local\Temp\0077425778cda31d01c97a6aa0c06fee.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e8de13a2b8485279a3c5f593988f232c
SHA191105681864a1bec6ad07058e4bbc0c1d584b3db
SHA2566789037042698e63085404dc58342cded90956d655c2337c8ca8aa9f14da0966
SHA512ea1cc913bab51968165cd36be3a2501f023281acb778ac2b00e89cfdf388abe52b785b262884d777b44937fe3bd8cf69cafd7ee874ca51e604454d0c65b6faf7