Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
09c8eca3914f0454f9b40ac453f17ee4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09c8eca3914f0454f9b40ac453f17ee4.exe
Resource
win10v2004-20231215-en
General
-
Target
09c8eca3914f0454f9b40ac453f17ee4.exe
-
Size
1.9MB
-
MD5
09c8eca3914f0454f9b40ac453f17ee4
-
SHA1
6cc5575108a8f9ecb19c7587af6b6937912f9825
-
SHA256
f267af5920bcd50a852fd00de19cefa67c06777b5950043f453eb269c32c902d
-
SHA512
d8cc87fe1cbbe906583d397c01b34f375ae7077fe98b3c25052ad1b4160b3abf0209a6f6c65708a96a4770a468d1a3ce099955464ca83d39c30524fabdad07ba
-
SSDEEP
49152:Qoa1taC070dmF3p2WnyOMKkQCSMIk2Zg3X2DznKxuC8D:Qoa1taC0JLNnaKk8G2+n2xCw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 5E84.tmp -
Executes dropped EXE 1 IoCs
pid Process 1932 5E84.tmp -
Loads dropped DLL 1 IoCs
pid Process 1308 09c8eca3914f0454f9b40ac453f17ee4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1932 1308 09c8eca3914f0454f9b40ac453f17ee4.exe 28 PID 1308 wrote to memory of 1932 1308 09c8eca3914f0454f9b40ac453f17ee4.exe 28 PID 1308 wrote to memory of 1932 1308 09c8eca3914f0454f9b40ac453f17ee4.exe 28 PID 1308 wrote to memory of 1932 1308 09c8eca3914f0454f9b40ac453f17ee4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c8eca3914f0454f9b40ac453f17ee4.exe"C:\Users\Admin\AppData\Local\Temp\09c8eca3914f0454f9b40ac453f17ee4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\5E84.tmp"C:\Users\Admin\AppData\Local\Temp\5E84.tmp" --splashC:\Users\Admin\AppData\Local\Temp\09c8eca3914f0454f9b40ac453f17ee4.exe FB90B7DE2CC643E2DA079EF6C4B4768AAC7AD3F338AF2226FB1EAA421808C8172E2670899110924F83655B368B0409599BCDCB92E0659383621C50624D6AE3292⤵
- Deletes itself
- Executes dropped EXE
PID:1932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD580fc3c29e2b280d291bd2749d2f131cd
SHA10bbc5757f3e3317237d5fce806afeaa768ea7a66
SHA256fdc4dcdebd81f8e00a14b508275167bb050fc1e8ca1db23cb189da4591a46441
SHA512ae2a2df7502fd56a7f23ea85c11a032d9c77a293d07921fa98465f9d8ababc2035e30c4471a1d09afee81570f0786d691b8398ccdff6597c82eb2f53a5e9448f