Analysis

  • max time kernel
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 00:14

General

  • Target

    082be0ff144d97b9ae0577399d6ba469.exe

  • Size

    1.1MB

  • MD5

    082be0ff144d97b9ae0577399d6ba469

  • SHA1

    6908b5174bf200d7223ba3656b8648d06082e069

  • SHA256

    b7ee2cb902c4f95c08eb2df40efed432f6882bf0d5272e3340070a54cdc74f50

  • SHA512

    112d71a35062cdfaafa0f19677064bb57b9c18c1e2a32e9ad290135fa975261092e7b55484d3ec48369d61eda62e2eefd87edff59090f93bd081c521da652e00

  • SSDEEP

    24576:SypW9SgLNZaOdcTMuUvxIg/2zpdn6FWlWUK8XrVJkM/RRmfNKKxrh:St9SgLNZa6xIRgOW4PkM/RRmfDv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1593.tmp
    "C:\Users\Admin\AppData\Local\Temp\1593.tmp" --pingC:\Users\Admin\AppData\Local\Temp\082be0ff144d97b9ae0577399d6ba469.exe 050FE653783DD6E1560EF5967BF4A02581C21BE4AB437FC3E02295557DE2CD774A78EEF547DA781B1B10CDFE3846C481F52B3A8ACE13377BA325571FED00F4D6
    1⤵
    • Deletes itself
    • Executes dropped EXE
    PID:2680
  • C:\Users\Admin\AppData\Local\Temp\082be0ff144d97b9ae0577399d6ba469.exe
    "C:\Users\Admin\AppData\Local\Temp\082be0ff144d97b9ae0577399d6ba469.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1593.tmp

          Filesize

          77KB

          MD5

          912e73a5f7903ee02de47ffa226422d0

          SHA1

          af436b2b5b871c1838d3c2f3d764791e5f369c07

          SHA256

          3833eb7357b6517d442b77f32378847728b85f60d8c6ff8420e98cd641230214

          SHA512

          cb61d6fc6cc3b5a2f27ee897f3c22d3dc72de6421f5b38ce6d8c87c9b37ae333c96455bfdf91ae54e902919a9e1c59dc2265e39cfa485a1566348e67bebd6bdd

        • \Users\Admin\AppData\Local\Temp\1593.tmp

          Filesize

          22KB

          MD5

          c772d5b5db5ae65f2cb74988f7d5fc00

          SHA1

          4ac2972f25391e6b9da91efe8fbecc52e8532d0f

          SHA256

          e86b2642dc54395a179a64f3e2da93a0109256f1798171a67e6fb8713c2d2dbc

          SHA512

          4f7d90efb303e7f31dba95ee242ae425df947e22250eda2c27bd21facff82f417b497a46b60dd6351adcf8153a5623a12a246f09cf0a4bd61b4a4c052856e12a

        • memory/2012-0-0x0000000000220000-0x0000000000270000-memory.dmp

          Filesize

          320KB

        • memory/2012-1-0x0000000000810000-0x0000000000955000-memory.dmp

          Filesize

          1.3MB

        • memory/2680-8-0x0000000000140000-0x0000000000285000-memory.dmp

          Filesize

          1.3MB

        • memory/2680-10-0x0000000000590000-0x00000000005E0000-memory.dmp

          Filesize

          320KB