Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:13

General

  • Target

    09b73b5e8ef2fd95dd5ed4421b780638.exe

  • Size

    1.9MB

  • MD5

    09b73b5e8ef2fd95dd5ed4421b780638

  • SHA1

    1d89796eb5eff464161a40d059b33603acd87dc4

  • SHA256

    6f9ba1f911ce6dde6b1a246ce426c497256dac4914f3415b55d1e6d8d023fbc2

  • SHA512

    b67faf1e559876aaf09e4f5589754ab6b1ac7558c3b2f71f31cc8802d303cbf7e3c659e63cf6e0bb3930f512fec8bace8cd5c21e3a99b6e21f8c2e236a10f0a0

  • SSDEEP

    49152:Qoa1taC070dQjOw0Ka/JLuMVeRlk+mjBsICirwiHnlGbL5h:Qoa1taC07j0BAMVeRlk+mjOICi0Onlih

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe
    "C:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\1758.tmp
      "C:\Users\Admin\AppData\Local\Temp\1758.tmp" --splashC:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe E8F36D20A677E2C1C8C7A8E9C0649130408ACC08073C46904733F303519497A1454BACC311F3D52F30824F691E2ACEE66ABCDB740EAB96E0A85925FC7DE2DBFF
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2520

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2012-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/2520-6-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB