Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2a81b0edfa629eaa2d297ca6fc859e7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a81b0edfa629eaa2d297ca6fc859e7f.exe
Resource
win10v2004-20231215-en
General
-
Target
2a81b0edfa629eaa2d297ca6fc859e7f.exe
-
Size
1.9MB
-
MD5
2a81b0edfa629eaa2d297ca6fc859e7f
-
SHA1
0f6560e25ccc584f93d1639cccf558f9e759cd80
-
SHA256
8add57ee340d496e130572f76528c7d65a071958b74e23ef55039397bf5610e3
-
SHA512
fbe94fcf0b2d3e2af87afb8b2ce92974fad14e86a00baa259f8f40a697335e5284044aa8d35d85ff8de4211bd86f1945c61468bee6fac9f327be613b826d346b
-
SSDEEP
49152:Qoa1taC070d7nAOYYYIk9HDS1aorJMYbhJm3yZQXYSwwZnvAW:Qoa1taC0WADYYIkNJGMGh0xXhwav5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 84D9.tmp -
Executes dropped EXE 1 IoCs
pid Process 1468 84D9.tmp -
Loads dropped DLL 1 IoCs
pid Process 1344 2a81b0edfa629eaa2d297ca6fc859e7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1468 1344 2a81b0edfa629eaa2d297ca6fc859e7f.exe 28 PID 1344 wrote to memory of 1468 1344 2a81b0edfa629eaa2d297ca6fc859e7f.exe 28 PID 1344 wrote to memory of 1468 1344 2a81b0edfa629eaa2d297ca6fc859e7f.exe 28 PID 1344 wrote to memory of 1468 1344 2a81b0edfa629eaa2d297ca6fc859e7f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a81b0edfa629eaa2d297ca6fc859e7f.exe"C:\Users\Admin\AppData\Local\Temp\2a81b0edfa629eaa2d297ca6fc859e7f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\84D9.tmp"C:\Users\Admin\AppData\Local\Temp\84D9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\2a81b0edfa629eaa2d297ca6fc859e7f.exe 894333A90A8AC50211E559957E4FCE09C8B033CB09160CE2FF54CD35D8CFE52728D6533624351F1480B4AF1EA6705AF4255725337F3A07FD0B5BD5F3F8081B442⤵
- Deletes itself
- Executes dropped EXE
PID:1468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5eb99f2eae8cdec4ab14ba18a5e5837c4
SHA18c0c47ab44aecfbaeb3913d250602632c678b053
SHA256d8d329e27f6799ecd5285244509bd63ed188f0bbc41d3e24d7d44d13b77aba5e
SHA512d8d6795aecfc8792a8df39e7327c65d3143c9f76160f632b5ae5d46ffb6aa9451a67e334573a0886f871ff89111f1b7d8473005a5a3c8209f99715027d7a9e12