Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:11
Static task
static1
Behavioral task
behavioral1
Sample
13144d8dbc7988f27622a0c6f8064adc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13144d8dbc7988f27622a0c6f8064adc.exe
Resource
win10v2004-20231215-en
General
-
Target
13144d8dbc7988f27622a0c6f8064adc.exe
-
Size
3.0MB
-
MD5
13144d8dbc7988f27622a0c6f8064adc
-
SHA1
ee6b01855b82aa557aaeade4d42717b41370983e
-
SHA256
23377b800d5d25788230190c57ca67c894624a707563b22c39c046365b33ea0f
-
SHA512
52038ee25947ae69724c70d6d99eb8abb2ea794f6fbbbed8722cbdf0644fa1567b585aa2f97dc1295d8d4c1b231417e00e73e94cdb5456a29386bc839dd05b30
-
SSDEEP
49152:f2q5e3oF/QvqkIsVLugpsTXnQMIk34rTUrQXW5ost+mqUbYzvAYvIrR8SGRAUmct:+q5syMIqLxpsLfGgrsbscmlnYvIDIsdQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2500 13144d8dbc7988f27622a0c6f8064adc.tmp -
Loads dropped DLL 3 IoCs
pid Process 3036 13144d8dbc7988f27622a0c6f8064adc.exe 2500 13144d8dbc7988f27622a0c6f8064adc.tmp 2500 13144d8dbc7988f27622a0c6f8064adc.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2500 13144d8dbc7988f27622a0c6f8064adc.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28 PID 3036 wrote to memory of 2500 3036 13144d8dbc7988f27622a0c6f8064adc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13144d8dbc7988f27622a0c6f8064adc.exe"C:\Users\Admin\AppData\Local\Temp\13144d8dbc7988f27622a0c6f8064adc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\is-Q5L6T.tmp\13144d8dbc7988f27622a0c6f8064adc.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q5L6T.tmp\13144d8dbc7988f27622a0c6f8064adc.tmp" /SL5="$500F8,2885213,54272,C:\Users\Admin\AppData\Local\Temp\13144d8dbc7988f27622a0c6f8064adc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50699b7ccbceb9bf2ada2b3b3573f2bd2
SHA1877a3e6bc6695d733b14b24eb080e722a1caab93
SHA25634cab08f65df018fe3b9b6221393056bc5309e68367eb695a06588a43cd22a9a
SHA51221723f0c0af633f36f20dd3825702530d22978a2b47b7b5064ec59865bf92db940ca6f68027941eac5412ed68061347492c819c4030c1c3018363de463ea5864
-
Filesize
11KB
MD557c3f8ff7b5a2905bc72901ebc9363f6
SHA17587967d28676709f95ca992c0489a77c9ce6b38
SHA256f8580c190ba1859b43ba719d98157598ab42a02c3963117e21c68d509707ea5e
SHA5129d6923b58e37a800f5d16b97a333dadbc4c63450bb8e14fff314f0663cd7c5e92acbf6ca93c2f59f0baf0ca8472e5088b56afe15b4767e4998fbfff1b32f90fa
-
Filesize
5KB
MD5b885ee1ca52cee2d6ddbbdd26464af5c
SHA19d2829c8b315316425eabf4895fc061cd0c9bb0a
SHA2568ea77cae87b4c8e47e9dea1fe5c8f91d9b4fc3991f225dd4833e1249ac747214
SHA5123247708321c32e087d2511cfede3283aad70ef5cd4fa08d112aa8c3b7ee06dd188c8febdb045e2b9ad838760102e382c0a7ef8acbbf85681465b4a633f2fadf7
-
Filesize
695KB
MD5620f32e56b46e90e8aee43febc59f6e3
SHA1d5edd63dd1390a1420b85f746e12a66625ae9354
SHA256bcc9d63213012bf25a37f48015e5f755d359f3b08d05d35319b03b4a72710730
SHA5128a9d2a2eb3891265cec379978399ad6c9b4bf3e12e0f381946b4390621b943b97fa04fbb87ad628652bd765b706eb2ff56001f24de24e9bcc487a59ca2f07d9c