Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
08285a15d43f7aa00ab9738c4f886792.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08285a15d43f7aa00ab9738c4f886792.exe
Resource
win10v2004-20231215-en
General
-
Target
08285a15d43f7aa00ab9738c4f886792.exe
-
Size
1.9MB
-
MD5
08285a15d43f7aa00ab9738c4f886792
-
SHA1
7ca8afcd79f99ec735c2212c689901eb2d6dfb2d
-
SHA256
314136a581586d6848e9c260f3b8eaba229df90202ef4912d44a634a7080777e
-
SHA512
ea50adb94d5b57c83af11bddd43e786240839337954e0612e00f0e0728ec71e95de0a3db289628a41bfee91475af06e7f8aeab9b2d84de2064e4b6c17af48f5a
-
SSDEEP
24576:dgdhhQGGnnazLpj4VHogiuGYNycAavew3mwmI1nk30sKbcGOyRWEMVM8w8sDDFUK:dqgazxcGYN139lnk30ray05I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 rjqcuqkiftj.exe -
Loads dropped DLL 1 IoCs
pid Process 2952 08285a15d43f7aa00ab9738c4f886792.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\gjimrdn\rjqcuqkiftj.exe 08285a15d43f7aa00ab9738c4f886792.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 864 2952 08285a15d43f7aa00ab9738c4f886792.exe 28 PID 2952 wrote to memory of 864 2952 08285a15d43f7aa00ab9738c4f886792.exe 28 PID 2952 wrote to memory of 864 2952 08285a15d43f7aa00ab9738c4f886792.exe 28 PID 2952 wrote to memory of 864 2952 08285a15d43f7aa00ab9738c4f886792.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\08285a15d43f7aa00ab9738c4f886792.exe"C:\Users\Admin\AppData\Local\Temp\08285a15d43f7aa00ab9738c4f886792.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\gjimrdn\rjqcuqkiftj.exe"C:\Program Files (x86)\gjimrdn\rjqcuqkiftj.exe"2⤵
- Executes dropped EXE
PID:864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5504dcd60087d519efe5461608e7e393e
SHA1dcb62bfdb41ef95bf8f0c9bb0ca31df12be616a3
SHA256e0826d01c706acf1315febb8879858301bfc59a6217dbf3657d476e1c1885ea2
SHA512a6680bc15031d38e8ddfe0aad504a9e5fb128646c1212cbda836c1c6b3077306f93b5316bb585f007aa0d1f66c12c0ee06244c4543bd38d088974498574442f6
-
Filesize
1.9MB
MD53399f125cd18cd77afa9e875a5e8422a
SHA1874c583d6bed2aa4fa655172343c78e7d33f02cd
SHA2569e89e502b4bb6255c9b3a14c54ccbe8286436b690077281c2c0b8c273bf650b2
SHA512ad0139e0ffcc0cc4347addf3f8230f0cde9efb25bc2d8460cf4ee599ed09be43da5ce683514c621c65bfd7556e748249d78db08ea1399a5d4be31e290c760c91