Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2d682d45e4ba7c26e23cf4281fd2d29b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d682d45e4ba7c26e23cf4281fd2d29b.exe
Resource
win10v2004-20231215-en
General
-
Target
2d682d45e4ba7c26e23cf4281fd2d29b.exe
-
Size
2.3MB
-
MD5
2d682d45e4ba7c26e23cf4281fd2d29b
-
SHA1
9ca05cde14736d324920f0b2fc370cb8b3ea214c
-
SHA256
e47f7ef927f067d736c3efbaf2e8fe83e1de7df4078a40701d222cb4576e7cc3
-
SHA512
d2ca2e836d53f10985b610dd16fcfb4da38fb564993f31ae5e06b160f933e8a51aac69b634413fd8f2691bd52579b82d0d84c5a494136d363c9c1cfa55fee575
-
SSDEEP
49152:5a/k0rzeSoviXgo7F+pF3LRXfSRSfZfmaeZpRgkUtNxJyrtinXBgJ:Q/zzeSoNF3LFfCSfZfreZ+NEkRgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp -
Loads dropped DLL 5 IoCs
pid Process 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2532 2d682d45e4ba7c26e23cf4281fd2d29b.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16 PID 2008 wrote to memory of 2532 2008 2d682d45e4ba7c26e23cf4281fd2d29b.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d682d45e4ba7c26e23cf4281fd2d29b.exe"C:\Users\Admin\AppData\Local\Temp\2d682d45e4ba7c26e23cf4281fd2d29b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\is-K2HIV.tmp\2d682d45e4ba7c26e23cf4281fd2d29b.tmp"C:\Users\Admin\AppData\Local\Temp\is-K2HIV.tmp\2d682d45e4ba7c26e23cf4281fd2d29b.tmp" /SL5="$4010A,2013056,54272,C:\Users\Admin\AppData\Local\Temp\2d682d45e4ba7c26e23cf4281fd2d29b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c55d8bed3cfe8347014536f3623b76d4
SHA108a3262cad3c8797799bfaa4a96701b7e036f086
SHA256b4052e4f24a2c0d028ffe43d5ca63836525437827eef4b7dbc317b6335f96b1f
SHA512d29904cb35c8dc2d680f6acbb003ee8f771375165533372ca4a40c1c7335b93d44065d51e814e76f7217f21e86dd87745447c3c918671c10748b7dc0fc9613cd
-
Filesize
320KB
MD560a6f95f00b99697808abcc526c14dbb
SHA139dd1d7177f9a79a2aa10bfba5c17cc8b651ca94
SHA25683155c865ce599fdc985e93add59952b35f7239ffc53d57ed9c0c96c95190847
SHA51287637932392a3c61ff60ebe7907c1faeb32154996fb0b4b6b74f4bc4b673dd29edc041b0489fe7178d8487d0c462afbe70994477f60d22cbdd35d28b70c767f0
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
127KB
MD51084c8ccb28c2fb58657fc55c10ab66c
SHA136e2580b5b03c82565214a7936df1189ca1173d0
SHA256b44b90262cb024c34d3c16ddcf860b649024071692814bd66ef142e13f8b3025
SHA512586ae88b2f739bcf351349f911cea4f8adb9663d0aeb81bbca65fb4d0e23ab9d3c5ab6f9f993a4c32988d3943ba27125b9b3a53a4a7b4b9d453059d19c005474