Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:26

General

  • Target

    281ddee96eac89f5ef71a61effe1b288.exe

  • Size

    82KB

  • MD5

    281ddee96eac89f5ef71a61effe1b288

  • SHA1

    474fe260a92605d438ea0182cb5dde0581cac17c

  • SHA256

    439db4a116ccf8e4335e2a9f73bc4216b466466c36c8b60bbe4fc37c0585eda7

  • SHA512

    50b6487e2e3c8758fe86a74bbd36d4853db8dd16ebfff6bbc99a60219ab69a551021e597a3032b77d22ae4ed24c6d6e04378944d6b1ac7b54c50714de047cc1a

  • SSDEEP

    1536:H761WbbT8SKjKS/0yHl1CyHIByP68Xrk5r0RsvYLwPaOxslDmVS4/Qxq:m1Wbn8SKjKS/0y/IByCQrGrQgJnsQT/R

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe
    "C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe
      C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe

    Filesize

    82KB

    MD5

    5735271d56e5ac2dcf2aee392ee1b96c

    SHA1

    1b43d5b4c45ec2a6c6253375c957fc3f841d37dc

    SHA256

    98f1af30494d506ffa4c351d0d5b24f4205c7b7eb7a579642194eb4f3f7b7e97

    SHA512

    256fd3fa4b503fe9d35c75a2c3cae1de21e82a6482c1604ff0be6347dfb10a039b1e87ce7f55e435515bafe9a04895a2e1752a30ed72a61db5873f10375fd409

  • memory/2156-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2156-4-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/2156-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2156-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2300-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2300-28-0x0000000000320000-0x000000000033B000-memory.dmp

    Filesize

    108KB

  • memory/2300-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2300-17-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB