Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 15:51

General

  • Target

    3a6507bea6ccad1ad838f5f191d435a7.exe

  • Size

    1.9MB

  • MD5

    3a6507bea6ccad1ad838f5f191d435a7

  • SHA1

    e532b6e64d63624be3986a257aba722d0de84066

  • SHA256

    d2bf07757c5bd90fbc2b74894e3a699f85067761aecf041e2c9d520684b8810f

  • SHA512

    a123943e36271d6b19cefe7113e775201e4a31ee5271b4170b70d49b855bfd7cca361f6f08db5e85f3889813536e27884c15cbdf7b286daa00d99fd3f9443f10

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dWYCjhjGc2xFvq8YEb4ZAIiG3pCmVxgZQSYNL:Qoa1taC070dY1GvPYERGXcG2Ryd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe
    "C:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\F8B.tmp
      "C:\Users\Admin\AppData\Local\Temp\F8B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe 1CCF5CFAF8988AC967F1C1FC409006B37A7079753A5244B238110EBE9FEA4C45736D6361EDD8EFE2D99FEAF49664CCD96431686F2C605EA592C84DE3C62CCA02
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2196-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB