Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:32
Static task
static1
Behavioral task
behavioral1
Sample
201fda6f4e3637a02c3ccfbbf5b97264.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
201fda6f4e3637a02c3ccfbbf5b97264.exe
Resource
win10v2004-20231222-en
General
-
Target
201fda6f4e3637a02c3ccfbbf5b97264.exe
-
Size
1.7MB
-
MD5
201fda6f4e3637a02c3ccfbbf5b97264
-
SHA1
739a36b316c2cec8711dad30dfb91a4f0b0953a1
-
SHA256
62b778a44b142330fb22d3ab71d77cdb78c63fbf112d87c9c10118638f741f85
-
SHA512
2ad638522c9ea0ebc5f2fcfd7412c261856824d97aa0c566deb10b0e5b254c785be75986df3319743db6599ef22b15976cdfbad5746df92a97dd91ffa3092ea9
-
SSDEEP
49152:5afahOLTV/Wf1+qwbp9+q5l7ZDRDHXJYinXBgJ:QfaeA1PoqEl7V1HXFRgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 201fda6f4e3637a02c3ccfbbf5b97264.tmp -
Loads dropped DLL 4 IoCs
pid Process 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 2812 201fda6f4e3637a02c3ccfbbf5b97264.tmp 2812 201fda6f4e3637a02c3ccfbbf5b97264.tmp 2812 201fda6f4e3637a02c3ccfbbf5b97264.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 201fda6f4e3637a02c3ccfbbf5b97264.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19 PID 1308 wrote to memory of 2812 1308 201fda6f4e3637a02c3ccfbbf5b97264.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\201fda6f4e3637a02c3ccfbbf5b97264.exe"C:\Users\Admin\AppData\Local\Temp\201fda6f4e3637a02c3ccfbbf5b97264.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\is-EFRCD.tmp\201fda6f4e3637a02c3ccfbbf5b97264.tmp"C:\Users\Admin\AppData\Local\Temp\is-EFRCD.tmp\201fda6f4e3637a02c3ccfbbf5b97264.tmp" /SL5="$70122,1488438,54272,C:\Users\Admin\AppData\Local\Temp\201fda6f4e3637a02c3ccfbbf5b97264.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD596687c78833927c255dce520c5a405ec
SHA155f01801117fdb9605645cffe27a2c44cc79f00c
SHA256404b06a8344aff9a6d65271b7ec42ab689d71dda914d6d459b2a8a78c6fe45a1
SHA5121d31b6090ce4727c66e05f0572b1e7517ed561217b4703c0389fb66df2eea3dbe5a459be5dab146948b8bba14bdc3b8a6235a8435b5382e1cc111581e64ac1e2
-
Filesize
245B
MD591576523415c482e3e31e9df3e2564b0
SHA1429183bcdea5d93fc24c15572967cdc432120d19
SHA2564c7f87a5629d760e61f0ea5f5ff6f3393aa2509a4055e0ce7a0ec408dbeff757
SHA512e87a7f721dd811676a7a50220adf6524f13ca58a2c5390e67e994e120c081e26cdc750bcf21e4530d868e0e0c33bba807ed04fa50222c4a0c5f599cf1c13b281
-
Filesize
5KB
MD536ba335f7f55814ce716c28fc7609d07
SHA14bec7b91d8a82b024462f769e7fd6dc7a9654330
SHA256b142fe914c4f4b6b9727cff9acc48f32f7a0b6c14992690d6d0ce924b25b72d4
SHA5122f7add437a32df77b8e83ae829a3e19c377700528cee1ce2e619f86ecb65b288457e94cf6a575bc9d2d474285bb92c53076b8c19935ebbbad6274ebccec40ff8
-
Filesize
1KB
MD5b153f8dfe895cfbb5b3840e17257851a
SHA1257c80dd04f3e7650ce58856dc8d8bfd94b45efb
SHA256fcea99e38cf910dfbdf6426b70eb6c3e9de9035da07c6f458eb6e8b057b23ee3
SHA512260b16396738504664960e4287b500b84d770043e6ca8b841f1288bab913e20f3ad3cf3a16584ef330561419765d085b79aca30bfbacd0e75de3cba7556b3374
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
49KB
MD502ecc74f7f91e9ffd84de708683236a6
SHA13532de0b77df8b0fc89e9c7eddec3fa71f98f5a2
SHA25630ad8a0e1cee091ca48c771adb2e76baf1a7d54b9f60dc47f54dfdc2d6f6691e
SHA512a3fdaa651f82428395bc412a2a04fce673768d3ef088b3748addf337d95464eb141ae7c286bff5c705eae05dd7b38207629588ae7e89ada15269463cd7acf541