Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:06
Static task
static1
Behavioral task
behavioral1
Sample
1f6dbecec1e7a5417fc90d7a84e6e8d3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f6dbecec1e7a5417fc90d7a84e6e8d3.exe
Resource
win10v2004-20231215-en
General
-
Target
1f6dbecec1e7a5417fc90d7a84e6e8d3.exe
-
Size
1.9MB
-
MD5
1f6dbecec1e7a5417fc90d7a84e6e8d3
-
SHA1
152bf10fd6c5a38fc225206d18d9328fbcab3455
-
SHA256
714888954bac94ad362601f809bd868f671a898af1c2b7f3b09adb1ed2fedc9d
-
SHA512
1b6169a3903ff0491b43d965c8afb0faad55353e32afa6088f99367bf290c8f6446bd38c6bf5b10490137f7052ea3bcc2632f4685a7bd4ff1cce4260fca61793
-
SSDEEP
49152:Qoa1taC070di316t2W8mNYGN4iBFpuet0Tgb5qXaS:Qoa1taC0pRmyelBG+qXh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 9D0.tmp -
Executes dropped EXE 1 IoCs
pid Process 1296 9D0.tmp -
Loads dropped DLL 1 IoCs
pid Process 836 1f6dbecec1e7a5417fc90d7a84e6e8d3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 1296 836 1f6dbecec1e7a5417fc90d7a84e6e8d3.exe 28 PID 836 wrote to memory of 1296 836 1f6dbecec1e7a5417fc90d7a84e6e8d3.exe 28 PID 836 wrote to memory of 1296 836 1f6dbecec1e7a5417fc90d7a84e6e8d3.exe 28 PID 836 wrote to memory of 1296 836 1f6dbecec1e7a5417fc90d7a84e6e8d3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6dbecec1e7a5417fc90d7a84e6e8d3.exe"C:\Users\Admin\AppData\Local\Temp\1f6dbecec1e7a5417fc90d7a84e6e8d3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\9D0.tmp"C:\Users\Admin\AppData\Local\Temp\9D0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1f6dbecec1e7a5417fc90d7a84e6e8d3.exe 63EC634AE8F7224F03CA32F6C291231A76D844112768DD6B75BC44BEA87287A5C22BDB61ED4584945E9DDB123C82BBB59F874B698E224C9038FC3AC6917179122⤵
- Deletes itself
- Executes dropped EXE
PID:1296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a06671a65013721f36ced9e6137694f8
SHA1b3fdd51152f356eafafc808f37d1ab560d56ba61
SHA256c4c6d24729a7b632db346cb0079f46f600f4e534475867e01ca3186359c8662d
SHA512b452b1a82e69d329a4fd20f9ab9f954935060e75802dc056e40ffe188e512d1ea7e0cb919f80414775dd4641180157b990d069a78e0d83d6de41ebe310c041e9
-
Filesize
89KB
MD5b7e6d63fce13e8e4eb5a1b229936e063
SHA10b9f7ee3eba7653189a764a990a74fa68d94cb48
SHA256e19e79102bf04984362710d0ed25def01d777d521b4673bf80d787cdc76f790b
SHA5125e0478a5781fff2d20c66aa115eff34e6bd158e85236f13f9c2ade71e28d4cf0ffa711cd541022a0b40928c247bae67b6a658b8cae30576a5101d91be5791bc4