Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:58
Static task
static1
Behavioral task
behavioral1
Sample
169311e589b031a3b56a36a862686c60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
169311e589b031a3b56a36a862686c60.exe
Resource
win10v2004-20231215-en
General
-
Target
169311e589b031a3b56a36a862686c60.exe
-
Size
1.9MB
-
MD5
169311e589b031a3b56a36a862686c60
-
SHA1
18a051fb287d4b5e65004f08e008f5484468d418
-
SHA256
754a0458a14d26470b9697ed722e2862da72edb0fa65ea60514118954c133707
-
SHA512
eb61b1fec450e420a5970c88f48ed6092c20f4ea2af9c05720cda6a065a8e758daa74e80bc2cc0c3729228db58771cffd1d96576a09c4021b1f97dcd0e94e124
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10deU2FJInl2+mpVs1t132pJNOwP8zETD/qEMWh:Qoa1taC070deU2Fqk+iUmPgwkzc7wMP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 FC9.tmp -
Executes dropped EXE 1 IoCs
pid Process 1048 FC9.tmp -
Loads dropped DLL 1 IoCs
pid Process 2212 169311e589b031a3b56a36a862686c60.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1048 2212 169311e589b031a3b56a36a862686c60.exe 28 PID 2212 wrote to memory of 1048 2212 169311e589b031a3b56a36a862686c60.exe 28 PID 2212 wrote to memory of 1048 2212 169311e589b031a3b56a36a862686c60.exe 28 PID 2212 wrote to memory of 1048 2212 169311e589b031a3b56a36a862686c60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\169311e589b031a3b56a36a862686c60.exe"C:\Users\Admin\AppData\Local\Temp\169311e589b031a3b56a36a862686c60.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\FC9.tmp"C:\Users\Admin\AppData\Local\Temp\FC9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\169311e589b031a3b56a36a862686c60.exe 26E9A817DDB7BA6221831F434AD14860A0B4EBDDD98DCDA36BED358560BFBA37F24AFB023F38AA272EDF1BA9C361B613D59AD86CF9BF727ADFB0EDCD8C1784692⤵
- Deletes itself
- Executes dropped EXE
PID:1048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b149211b89122a6d568798499cdd791c
SHA1636bd59a60968b7661d89b173c348fcf2bf2897d
SHA256bd8d8bca2d6cb0caaf068015de1cf7394a3084ebbe8f0ed23e45dbad07fa1605
SHA512d002d0a31efe7c35f03d96c71739500c352b7033f13e227c02c4e4e1741782a39ea7de472416f263822c8d975493c0a144d9e657955cf8d62d24e54480e7e9bc