Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
036e11f0b890ade8b503ec66733f2360.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
036e11f0b890ade8b503ec66733f2360.exe
Resource
win10v2004-20231215-en
General
-
Target
036e11f0b890ade8b503ec66733f2360.exe
-
Size
2.1MB
-
MD5
036e11f0b890ade8b503ec66733f2360
-
SHA1
84c7e41d1fc1ad881fbfc2a14220568acc1df12f
-
SHA256
856ae8900fe7281ed0ae62bb8bfabbababb59b1cf0c819201fc245de8262f659
-
SHA512
983712f8e01eeceb43ac90685bb19eca0828e6ea0e15f94a2bd91dafdded5bab3cf6e0fb62a7625fc91300c65ed1a6243d7d2797918771d7d442050b69aeeeb3
-
SSDEEP
24576:dgdhhQGGnnazLpj4VHogiuGYNycAavew3mwmI1nk30sKbcGOyRWEMVM8w8sDDFUn:dqgazxcGYN139lnk30ray051Os
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 qvlzoljhzmft.exe -
Loads dropped DLL 1 IoCs
pid Process 1584 036e11f0b890ade8b503ec66733f2360.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\pacxe\qvlzoljhzmft.exe 036e11f0b890ade8b503ec66733f2360.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2536 1584 036e11f0b890ade8b503ec66733f2360.exe 28 PID 1584 wrote to memory of 2536 1584 036e11f0b890ade8b503ec66733f2360.exe 28 PID 1584 wrote to memory of 2536 1584 036e11f0b890ade8b503ec66733f2360.exe 28 PID 1584 wrote to memory of 2536 1584 036e11f0b890ade8b503ec66733f2360.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\036e11f0b890ade8b503ec66733f2360.exe"C:\Users\Admin\AppData\Local\Temp\036e11f0b890ade8b503ec66733f2360.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\pacxe\qvlzoljhzmft.exe"C:\Program Files (x86)\pacxe\qvlzoljhzmft.exe"2⤵
- Executes dropped EXE
PID:2536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD5d932b66154f705f8667d98a162d13652
SHA11ab30dac13536f9c41fc4c09cf5b2d4783df553e
SHA2565a23fca26c0ac2d3d1e5ce391739ee7729e4be73d77a45834868d74ddb57621b
SHA5128050a29ba7816ce815792d942904715e292f5117a640b8fc7e44144ce6c74f03aa9633d315c67f1db2288af890423a7099ca503c435e0de5a9dcbdb05b346326
-
Filesize
2.0MB
MD5b93feb493e6168566bc465379133cde2
SHA1dbdf6b687145000b171ce0be9040fde1ce282e56
SHA25649f20f0a67a83c08afdfb37a3f265bfcc0567c8745c65767bf1d58427d3072ed
SHA512a07cf8425ef5b9b0f6b1b74ed56aa3dfc0c9f42efda38ccbb61a8d829284f8d75ee01e03bcb703ed0ecfcc327388ad91849ac8c760404e1986a9a962477718a5