Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
1674addbe5c04bde9b0a27e9371191ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1674addbe5c04bde9b0a27e9371191ec.exe
Resource
win10v2004-20231215-en
General
-
Target
1674addbe5c04bde9b0a27e9371191ec.exe
-
Size
873KB
-
MD5
1674addbe5c04bde9b0a27e9371191ec
-
SHA1
cf134ba529d2bd432d8cbe01792b7cc77fdff3fc
-
SHA256
a2b2bf44d1edc0670092a97cdb77df73289b71e98f67865f90a687070348200f
-
SHA512
df5f7a87123073e1133511d68f6d3cc5873acaa2278ce2f3cdd90a634123b79d7a8ba96928de5d93f48edaead33555ec5ef41fd208fd0af12ce252c3c2d8c8d2
-
SSDEEP
12288:8aS9YwKkLvgXFuvUOCc4gCJQwCvlSkB/ykJQdhWoKJLZmN1IKJUZm:8aOKkLoCUOeDsSFW1LZmN1VUZm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1736 197A.tmp -
Executes dropped EXE 1 IoCs
pid Process 1736 197A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2012 1674addbe5c04bde9b0a27e9371191ec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1736 2012 1674addbe5c04bde9b0a27e9371191ec.exe 28 PID 2012 wrote to memory of 1736 2012 1674addbe5c04bde9b0a27e9371191ec.exe 28 PID 2012 wrote to memory of 1736 2012 1674addbe5c04bde9b0a27e9371191ec.exe 28 PID 2012 wrote to memory of 1736 2012 1674addbe5c04bde9b0a27e9371191ec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1674addbe5c04bde9b0a27e9371191ec.exe"C:\Users\Admin\AppData\Local\Temp\1674addbe5c04bde9b0a27e9371191ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD556c1ccb8d146b8085dc77f87e61a5b5a
SHA16fa69d162bd0f196a187072d69812b8f78315cda
SHA25671c3aec860ed60a8627a8707f196a14bbd4d4c12413a3eb10430e45853ed58d6
SHA512b7addbecb1668669e974d945d8ceb8bf98c4cd6444a6c57739e24df785b36eef7973abf78c237aee7fea4d9629b6328fea932812f9cf9099c7482425c42d5c29