Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
29cefd4cef10a62861a6721b84442ada.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
29cefd4cef10a62861a6721b84442ada.exe
Resource
win10v2004-20231215-en
General
-
Target
29cefd4cef10a62861a6721b84442ada.exe
-
Size
1.7MB
-
MD5
29cefd4cef10a62861a6721b84442ada
-
SHA1
71e75805152ab76b0ad4fc392f51d76e7cafbeed
-
SHA256
cbe2178c1ea138fdcec712b51a0c44c6956defbc6f4fbf2562d5e819acf94e07
-
SHA512
69bb4854b361d166676f2e88e7d93df99d8885eb498f525dcfeb48f35587ae20b10093217ad908e323c6c1b07d26929c406e028bdb4e70f91a9e0268314c060d
-
SSDEEP
24576:dgdhhQGGnnazLpj4VHogiuGYNycAavew3mwmI1nk30sKbcGOyRW9ZHXPniKA0:dqgazxcGYN139lnk30rCniK/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 ucsxnsioeejn.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 29cefd4cef10a62861a6721b84442ada.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\dfhazooy\ucsxnsioeejn.exe 29cefd4cef10a62861a6721b84442ada.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1724 1712 29cefd4cef10a62861a6721b84442ada.exe 14 PID 1712 wrote to memory of 1724 1712 29cefd4cef10a62861a6721b84442ada.exe 14 PID 1712 wrote to memory of 1724 1712 29cefd4cef10a62861a6721b84442ada.exe 14 PID 1712 wrote to memory of 1724 1712 29cefd4cef10a62861a6721b84442ada.exe 14
Processes
-
C:\Program Files (x86)\dfhazooy\ucsxnsioeejn.exe"C:\Program Files (x86)\dfhazooy\ucsxnsioeejn.exe"1⤵
- Executes dropped EXE
PID:1724
-
C:\Users\Admin\AppData\Local\Temp\29cefd4cef10a62861a6721b84442ada.exe"C:\Users\Admin\AppData\Local\Temp\29cefd4cef10a62861a6721b84442ada.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1712
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD580234d85cba054da710b0cfe0566c5ac
SHA171da9f8d799c48bd87ebca48619f88a4db8df59e
SHA256a5fc38baaea16ca7992ffcf4f8e886d4f30f996bf0248a6b4849d0331c80a8c1
SHA512bb418296af085c4684b58f4f07a613cb0366fcf9c738dee2c14361b17f4d032b6add7aa0f0a86b0129ad52fd46ce9da3f9aac931b02ce133416463dbde618bd4