Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:43

General

  • Target

    2c123aca8a53dba0b274ef42b7e94a7c.exe

  • Size

    1.9MB

  • MD5

    2c123aca8a53dba0b274ef42b7e94a7c

  • SHA1

    3191a832974f4d9e58607e9d4c375dc97134e5ac

  • SHA256

    de0caade52b081a1c081e2df5d9f00299c59ff5bb76df4a42a1b97639a6df1e4

  • SHA512

    0f0ce24aea82cdfd8a3f516d7f757a11e492803830d2c70a1cd3c0e5162a8886a291116df8bb5648b4bfa651821af601b83ecfac06e6493bd525cb2dc6a9499b

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dri8Ht27QmQnaCmCMzvhwMZYn4X7k8sSTRtEc:Qoa1taC070drix7QtnwztCm7rNtEFAZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\2607.tmp
      "C:\Users\Admin\AppData\Local\Temp\2607.tmp" --splashC:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe E3DFEF609B1F14BC06C1E2EE3CF691E46898AEF89447D5D975F015C07741FCADE078BC81750284B61C0BB9390ECED0EB1A244C7E7B1052CD7F52D170D5027600
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2060-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2336-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB