Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
158e73e7ff7e3a2c1d020caf2132a62b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
158e73e7ff7e3a2c1d020caf2132a62b.exe
Resource
win10v2004-20231222-en
General
-
Target
158e73e7ff7e3a2c1d020caf2132a62b.exe
-
Size
1.9MB
-
MD5
158e73e7ff7e3a2c1d020caf2132a62b
-
SHA1
aa12d1f39a8646c94c8a63153c16c96c4f658416
-
SHA256
4538af51bda09bd6888112ec66f753d4762c40a94342463ff6610b0fea38b4d5
-
SHA512
fc2687f5edcefb7e233696ed1f7acd457504612d6254d0ca9bd673e4f4dbfbdd3d7acb9ce35bbccb3899804a32e5345b6f6b8e224f9fc4df461563cb09d21c56
-
SSDEEP
49152:Qoa1taC070dCfor++yLlw7/ZQViIFyNrvG+:Qoa1taC0HKYLO7/WimOr++
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 70DC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2196 70DC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2204 158e73e7ff7e3a2c1d020caf2132a62b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2196 2204 158e73e7ff7e3a2c1d020caf2132a62b.exe 28 PID 2204 wrote to memory of 2196 2204 158e73e7ff7e3a2c1d020caf2132a62b.exe 28 PID 2204 wrote to memory of 2196 2204 158e73e7ff7e3a2c1d020caf2132a62b.exe 28 PID 2204 wrote to memory of 2196 2204 158e73e7ff7e3a2c1d020caf2132a62b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\158e73e7ff7e3a2c1d020caf2132a62b.exe"C:\Users\Admin\AppData\Local\Temp\158e73e7ff7e3a2c1d020caf2132a62b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\70DC.tmp"C:\Users\Admin\AppData\Local\Temp\70DC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\158e73e7ff7e3a2c1d020caf2132a62b.exe 85A123F38F47A3D9C8879157FD78D20D08B050E6C7EB07081C7DC8DD879AD6DE3D0806F6CDE01C90A0687D809FFCD2208FB9A1D736006D0F1495B54ADE0CE4152⤵
- Deletes itself
- Executes dropped EXE
PID:2196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c9523cbafdb613fda14a86b567ed4494
SHA11fdf240b6b8c2d1e5e2d98dafb4d494125b3347c
SHA2563f63c33b5acd46fdf38748b8e223e9a11c652e91a5df77d60b1a0f0dbcd3fab5
SHA512da132bb4ee275e390c2aae6ce8f646ed026cad5dc968ca005907f18fd5d92268818c6079978c3de437968fc35b619ddbf4341995297145091af22ceea4726d8b