Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
273cd22d5fd29d213fcb2a91cbce7762.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
273cd22d5fd29d213fcb2a91cbce7762.exe
Resource
win10v2004-20231215-en
General
-
Target
273cd22d5fd29d213fcb2a91cbce7762.exe
-
Size
1.9MB
-
MD5
273cd22d5fd29d213fcb2a91cbce7762
-
SHA1
974421c6cdfae31aa7de22c2cfc51d5b3914a338
-
SHA256
75bdbd907ab87848ca53795f16106adc38d1252aa58120bdd2fc8b3b72e032bd
-
SHA512
33d2493f51cbbaac7b912b4e24eef8adc6aa911b60fbfbcf668b29683cc4175c36eca3839a5a83780a33a44bb285563abbd19c10161df6948539bb967abfc0d9
-
SSDEEP
49152:Qoa1taC070dRd/+EFquicN2dLz4J1tTtU+5v:Qoa1taC0Md/fFNicuM1d/5v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 8288.tmp -
Executes dropped EXE 1 IoCs
pid Process 2128 8288.tmp -
Loads dropped DLL 1 IoCs
pid Process 1748 273cd22d5fd29d213fcb2a91cbce7762.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2128 1748 273cd22d5fd29d213fcb2a91cbce7762.exe 28 PID 1748 wrote to memory of 2128 1748 273cd22d5fd29d213fcb2a91cbce7762.exe 28 PID 1748 wrote to memory of 2128 1748 273cd22d5fd29d213fcb2a91cbce7762.exe 28 PID 1748 wrote to memory of 2128 1748 273cd22d5fd29d213fcb2a91cbce7762.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\273cd22d5fd29d213fcb2a91cbce7762.exe"C:\Users\Admin\AppData\Local\Temp\273cd22d5fd29d213fcb2a91cbce7762.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\8288.tmp"C:\Users\Admin\AppData\Local\Temp\8288.tmp" --splashC:\Users\Admin\AppData\Local\Temp\273cd22d5fd29d213fcb2a91cbce7762.exe 51F2A7BC85EB0531A2292B97EC3C6099A3CFF52E370F80AE9F4FB72B8CF6A8B57AC4FE2BF1754040E89727F356AE23E6A3E245644FCB3BFF82C51D3DF4BFBBFC2⤵
- Deletes itself
- Executes dropped EXE
PID:2128
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD55500f79b222866bf59240ab27d298288
SHA138f8109f35d3af926f5924e8e9fdd2fdba80182a
SHA25653b9d005c32bbc8476a2b79de29595b99ce403e0f4db137a9f46d3fe578deec9
SHA512b2d417d30bc049bab960bb5513f32ec2b0bf01a102920bb6839d8c58521c760b6bcf898dee21c5d5f2a2646c60cdaea0f47153d4f461511a31d98dd3d59dc5c4