Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 21:46
Static task
static1
Behavioral task
behavioral1
Sample
1d7a6c287212cc8db18700695d3356e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d7a6c287212cc8db18700695d3356e6.exe
Resource
win10v2004-20231215-en
General
-
Target
1d7a6c287212cc8db18700695d3356e6.exe
-
Size
592KB
-
MD5
1d7a6c287212cc8db18700695d3356e6
-
SHA1
b3cc8232f4a445c9dc035d38bc24cdc4f84e285f
-
SHA256
7e58ccda1c21273054defd9e4adaa769a96ad92fc92dd489c661627b0a183e78
-
SHA512
209f05021bf9145899f2d547fd113e31c959c8e7d74cd363f544a65d9eece248b50a275513d974f2366e3c0397d9db9e23ddfde67c789e9ee555e2ed8202a5af
-
SSDEEP
12288:MLry/neyx7f/A64j7P+tixhT8n3qBmc1YkVYcrKZnfJPE:qKeyxTAJj7P+yW6mc1YgeZfZE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 fayubwjapfhcec.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 1d7a6c287212cc8db18700695d3356e6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\fcuhbulezt\fayubwjapfhcec.exe 1d7a6c287212cc8db18700695d3356e6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2376 2084 1d7a6c287212cc8db18700695d3356e6.exe 28 PID 2084 wrote to memory of 2376 2084 1d7a6c287212cc8db18700695d3356e6.exe 28 PID 2084 wrote to memory of 2376 2084 1d7a6c287212cc8db18700695d3356e6.exe 28 PID 2084 wrote to memory of 2376 2084 1d7a6c287212cc8db18700695d3356e6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d7a6c287212cc8db18700695d3356e6.exe"C:\Users\Admin\AppData\Local\Temp\1d7a6c287212cc8db18700695d3356e6.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\fcuhbulezt\fayubwjapfhcec.exe"C:\Program Files (x86)\fcuhbulezt\fayubwjapfhcec.exe"2⤵
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
609KB
MD5cca778832cf606447f7d1822e33e85a1
SHA149fbe1a6fc2a6eecdebb1a908c60df7c55ee2e9d
SHA2561368fbb1efd819c8bc21c412eb02fba79a14b19212e6ed12a9d1164942963065
SHA5127b70fa0f1d34f02f1744a13fb3f8a15297646578e420c48a4cc1a4ca7d86cc55c330836398a928a05f858f3276ceaadb9c1d0e86114cda93525cb0303d33780b