Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:42

General

  • Target

    1d619c9fd03fd214ec21e90a113bdc52.exe

  • Size

    82KB

  • MD5

    1d619c9fd03fd214ec21e90a113bdc52

  • SHA1

    f30564ba6c4ebf13fc274a5c62d47eb4100a57bd

  • SHA256

    3985185522da6dfd62dab8a264ac2f77683cfa8597afcc10b76e6d0311482cfc

  • SHA512

    e2498c22aaf0a46f03a6992d35cfdb20311835703ebda7be3dd8b2216580dbaf334113fc7ec8bb2cc2b8a57b569bd2066beb78048f3819c1ef0145058ffa6873

  • SSDEEP

    1536:tq9rm1l5+ifuoJsb4OIqgtqYV64AUHdJlznQXEEyxKEfNZqnTcv0ZsX//wK:urm1/7ud0nh64dLdnkByMnSOUD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe
    "C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe
      C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe

    Filesize

    82KB

    MD5

    22ebdebe2239910dfa48d597a51c61f3

    SHA1

    d7669f533c011f399e4d16dba18908e76a9b888b

    SHA256

    faa2625484f1500f9defd1767610988da99a90a59724093bf653e219097ee895

    SHA512

    55ad23c580e8f1b79c2eb3a3e8e45a4683e5c9097da98989b201e70c2b64b8382837e23ea48cbe69e565d2fb18b462c4ddf6ccd4e7a1aa056eb554a241c860bd

  • memory/1888-18-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/1888-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1888-27-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB

  • memory/2220-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2220-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2220-1-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2220-12-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2220-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB