Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
200026d00b9abff634357ed7cafc2ba3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
200026d00b9abff634357ed7cafc2ba3.exe
Resource
win10v2004-20231215-en
General
-
Target
200026d00b9abff634357ed7cafc2ba3.exe
-
Size
115KB
-
MD5
200026d00b9abff634357ed7cafc2ba3
-
SHA1
ef1801e1d8e03d9394e559d6af3c1234a6029e42
-
SHA256
e8072c8db7ee8a902ca5a675d7a943ff69362b70136ce8a1543b3d1223babd97
-
SHA512
28cabf28c3854658193754090362916a9b79b36a70772a6c38b060bb18fb0cb4e24a14a6a77891c78881a5f4f2ad5dbeeb02fe87701b49045af93a252a893c4f
-
SSDEEP
1536:iIqtjt4ZV6+DP5zybDozk0ZB7RkID9YyHAteIOPiO0HbDYISgR/kojnqVBGkQVjz:Dj6yWbifJJYyHsyHsxSgR/oVBGkuu4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 sxe92CF.tmp -
Loads dropped DLL 2 IoCs
pid Process 2112 200026d00b9abff634357ed7cafc2ba3.exe 2112 200026d00b9abff634357ed7cafc2ba3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20 PID 2112 wrote to memory of 2692 2112 200026d00b9abff634357ed7cafc2ba3.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\200026d00b9abff634357ed7cafc2ba3.exe"C:\Users\Admin\AppData\Local\Temp\200026d00b9abff634357ed7cafc2ba3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\sxe92CF.tmp"C:\Users\Admin\AppData\Local\Temp\sxe92CF.tmp"2⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5f8d2813d9a23669263281b4064c8f0c4
SHA1b6de259f2c2f9405273720d0fbe13f482b5e96a1
SHA25689966f6fa62944530214d47648974bc3c2cc0f613d6a80ff2f2acc514850fb84
SHA512908e289fd00d3c2cd8bbf644013c16f57b1d6b44f144e18876851f125b0870f63c81babc2f077fa21311a8060df56a68d9969b44a575c1a1af6bdd3aa5999043
-
Filesize
164KB
MD5db2220d96fe94a8c18a08776d2f28484
SHA1422ce4e704342aa91278ae6f40e1ebe538824b9e
SHA25630aaffe141c6b1bbf9b3413da251ca0298bb89b381b1949511d3a0e29345557e
SHA512980713b604cb25abbaac267b2b458a11e6d3ab17901119965d7c46c5bf0eeb5705b12d9ecf85ac639f09601754e3e6e9696a4bf418bfce2662f3e59c55d16558
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
151KB
MD53207a09bae08e27461bdc1fce501f9ce
SHA194631bce6952511bfadde8ed7f57f01f21cda910
SHA2562f11a853bf836374bf6c5b273e5df056ff0b790b1b3bc101629cef045785829f
SHA51223cce3275213b911f4c76ae98e22bc3faa38f3a5ad78f1cebdb370640ece4e72b2f62495dbdb5cff67cb83dd0f25b106d08ac99b07630437b0aad18c072dbe23