Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 01:51

General

  • Target

    2367633d7dea17d6e0f9453c448e503d.exe

  • Size

    123KB

  • MD5

    2367633d7dea17d6e0f9453c448e503d

  • SHA1

    a15ff1a644cc76d2e0ce3af9a6e9e75f6785d2ae

  • SHA256

    e875b4683c849236037f36f7f19fd72bdc6f860ddd4a1309ecaf6b576d4929f2

  • SHA512

    1954dac8d23b69f44cbfdf697f9ca3433b25db4298f4cf5622592bf254caae110e55c66c7991764412f4b0b68f91ffd2b32bf28f8bff008cb1107307dd1104ed

  • SSDEEP

    3072:3TBfggv/AbPFrkgCn4HibydJWmivMeJ881MNQUvF94dPQ:3TB7v/uFrJTCbyJ5ivMa881MNQUvF946

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2367633d7dea17d6e0f9453c448e503d.exe
    "C:\Users\Admin\AppData\Local\Temp\2367633d7dea17d6e0f9453c448e503d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\@FB7E.tmp
      "C:\Users\Admin\AppData\Local\Temp\@FB7E.tmp" "C:\Users\Admin\AppData\Local\Temp\2367633d7dea17d6e0f9453c448e503d.exe"
      2⤵
      • Executes dropped EXE
      PID:2388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\@FB7E.tmp

    Filesize

    80KB

    MD5

    b9a770ddf21b709223ab95a9efbf3b28

    SHA1

    069ae45665cc34ac2d98d0abd1700a6ee958253f

    SHA256

    cef82267b0131bded3a893d8fa58f366a0e4f23e6eef3aba2cc4e04c8f68e4b4

    SHA512

    dae1d1ce41038cc742705c7783d419c4f05f171a15af5c895571490718db525b7d753544c32bb846b099b3151bbb3bfc2e4d695b5d45ec6e5d946c4428dd1914