Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
2d4a47354738721ad8ecb57bc9415194.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d4a47354738721ad8ecb57bc9415194.exe
Resource
win10v2004-20231215-en
General
-
Target
2d4a47354738721ad8ecb57bc9415194.exe
-
Size
1.1MB
-
MD5
2d4a47354738721ad8ecb57bc9415194
-
SHA1
0ebe54742f25725911d120870a13c2e961fca8cc
-
SHA256
b28d0fdef9637f306559d35c844379eaf4f29077ed4b214f327a34762ebb4f8a
-
SHA512
cf42a839c60fed0e51bbde79d16505034e74044fe0946d2bb2abab3251eaccf530a02af8ceed5fe29691b5e54bd8951224e1dc918df1f4eb9d18926f14ca4909
-
SSDEEP
24576:SypW9SgLNZaOdcTMuUvxIgrsiUI3Kd8Vg706XJSy8Bzz4pA25FRn:St9SgLNZa6xIOsiURd8kdYy8Bz4Oc7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 7945.tmp -
Executes dropped EXE 1 IoCs
pid Process 2480 7945.tmp -
Loads dropped DLL 1 IoCs
pid Process 1476 2d4a47354738721ad8ecb57bc9415194.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2480 1476 2d4a47354738721ad8ecb57bc9415194.exe 28 PID 1476 wrote to memory of 2480 1476 2d4a47354738721ad8ecb57bc9415194.exe 28 PID 1476 wrote to memory of 2480 1476 2d4a47354738721ad8ecb57bc9415194.exe 28 PID 1476 wrote to memory of 2480 1476 2d4a47354738721ad8ecb57bc9415194.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4a47354738721ad8ecb57bc9415194.exe"C:\Users\Admin\AppData\Local\Temp\2d4a47354738721ad8ecb57bc9415194.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\7945.tmp"C:\Users\Admin\AppData\Local\Temp\7945.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2d4a47354738721ad8ecb57bc9415194.exe D4FFC99A1C45EDED860B7113021321196849422770E9610D4F904B46C44782354AE2AC403CF2B378FF8D6EB2A1F1E6C098CC2A5286163B6362CDC2108B9326192⤵
- Deletes itself
- Executes dropped EXE
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
565KB
MD50550a31afedfc03241cd8850fada0e7e
SHA163183b04537c504bea0aaba2a109955bd11bd965
SHA2560f2befcf8758ef0452da78240db7d2547fa2923ec12ed0a6fcd74e9ecd5a3628
SHA512449d754c116a280aa014cfaaf43d3e1854296ae06d638d42fee5229bbded8fa97385a22c53e9712353eb06ec77b128604142c2390d09a75cf6464d12919c283b
-
Filesize
1.1MB
MD5dbabdd7d1e90e082f35c065c9cfc88c8
SHA1bc0357355e47a27b1ebd6cce46a03b49452dc786
SHA256f22f6a3b35a8f779b72076865d50438150d87b0bb9f3ede86f1bb371b2c67901
SHA512204aae078ae8cc56c451e61bf66107da336c31db6145bd6e8fc36bd754eff0923ee2ae7b1c3d704b08b24f803ff788a89fe6e93196a965d49ad0b79ce8b3e03e