Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
0d5cc91890c411599e994ab4d927350b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d5cc91890c411599e994ab4d927350b.exe
Resource
win10v2004-20231215-en
General
-
Target
0d5cc91890c411599e994ab4d927350b.exe
-
Size
739KB
-
MD5
0d5cc91890c411599e994ab4d927350b
-
SHA1
b64c4752537fc05bd460918fe252ef64e72d2651
-
SHA256
b64cc3011b334fe3fdc47852da28f1d865a1f71dd819827a035b9b3adab1a163
-
SHA512
56418a6586f0cc7f985e944811744fdce2ddaea5e238d02b21435768a3738ba7cccc738190b677f0eb66916a24cdcd4b63701df8a35c7a44802ba053ccdf059b
-
SSDEEP
6144:d/QiQXC45m+ksmpk3U9j0IeP2soxvjFEOTb9WmZX/8shzdsY4CpHPhnq/FK:VQi34c6m6UR0IeP2p1hf39Wkv8xwJqdK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 0d5cc91890c411599e994ab4d927350b.tmp -
Loads dropped DLL 4 IoCs
pid Process 1868 0d5cc91890c411599e994ab4d927350b.exe 2236 0d5cc91890c411599e994ab4d927350b.tmp 2236 0d5cc91890c411599e994ab4d927350b.tmp 2236 0d5cc91890c411599e994ab4d927350b.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16 PID 1868 wrote to memory of 2236 1868 0d5cc91890c411599e994ab4d927350b.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe"C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp"C:\Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp" /SL5="$30158,506127,422400,C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD591f199fa75234b4873a79f8a2e4a21ad
SHA17e323707b245fab333211fc0b9f95a5ae9c5ca09
SHA256c13eadcc5c97cfb4a82978f64a8ef0d9a34dfd50930617b02fd97636782e66ba
SHA512f24ab9d75a0f62bbf63cae3e75734f973fa5f6b8d3828ca2a9a22caea57e54c1f2cc3e434eb7904499932b6fc4c5972a3ab6cad36d0b1267f78ed124c614a5e9
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
120KB
MD5adf7b237376b01f0ffe2fe6303b16e9e
SHA1f690c2776a42a5fa0a1e07c815588d3cfde6092b
SHA256331b412b3cda48968903d0bad223e7c8c0d5ed71364ad08d35a249e3e7808d52
SHA512bcab8c618d46ed7aec5c880b206be38ce0d514da7cea1c92a7ceec0a1e1990051b2732c9ada4cb95d4443c9a960e019ec3dd2e412902aa10ec6e4c2367cef615
-
Filesize
19KB
MD538df3061b6a9601137760cd3a38de9c5
SHA1287dc3a02f0994f31e024de81cd986e5354ba5de
SHA25605c5c4865fd9bd1ef981723c12bd44c242c355853b03c5d1d0720f166a0fad7a
SHA5126029216386fef553deffc77e63469189ec1efe69dd886253ab2c5294bceeddaa4c8d8c7b48a5f676ddb86e87327bc1aa24ca551d7d62ae1f1abea35d57496319