Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:21

General

  • Target

    29cefd4cef10a62861a6721b84442ada.exe

  • Size

    1.7MB

  • MD5

    29cefd4cef10a62861a6721b84442ada

  • SHA1

    71e75805152ab76b0ad4fc392f51d76e7cafbeed

  • SHA256

    cbe2178c1ea138fdcec712b51a0c44c6956defbc6f4fbf2562d5e819acf94e07

  • SHA512

    69bb4854b361d166676f2e88e7d93df99d8885eb498f525dcfeb48f35587ae20b10093217ad908e323c6c1b07d26929c406e028bdb4e70f91a9e0268314c060d

  • SSDEEP

    24576:dgdhhQGGnnazLpj4VHogiuGYNycAavew3mwmI1nk30sKbcGOyRW9ZHXPniKA0:dqgazxcGYN139lnk30rCniK/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\dfhazooy\ucsxnsioeejn.exe
    "C:\Program Files (x86)\dfhazooy\ucsxnsioeejn.exe"
    1⤵
    • Executes dropped EXE
    PID:1724
  • C:\Users\Admin\AppData\Local\Temp\29cefd4cef10a62861a6721b84442ada.exe
    "C:\Users\Admin\AppData\Local\Temp\29cefd4cef10a62861a6721b84442ada.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\dfhazooy\ucsxnsioeejn.exe

    Filesize

    92KB

    MD5

    80234d85cba054da710b0cfe0566c5ac

    SHA1

    71da9f8d799c48bd87ebca48619f88a4db8df59e

    SHA256

    a5fc38baaea16ca7992ffcf4f8e886d4f30f996bf0248a6b4849d0331c80a8c1

    SHA512

    bb418296af085c4684b58f4f07a613cb0366fcf9c738dee2c14361b17f4d032b6add7aa0f0a86b0129ad52fd46ce9da3f9aac931b02ce133416463dbde618bd4

  • memory/1712-4-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1724-6-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB