Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 17:13
Static task
static1
Behavioral task
behavioral1
Sample
3a9acdadcb5b097eff517b66615d27b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a9acdadcb5b097eff517b66615d27b6.exe
Resource
win10v2004-20231222-en
General
-
Target
3a9acdadcb5b097eff517b66615d27b6.exe
-
Size
1.9MB
-
MD5
3a9acdadcb5b097eff517b66615d27b6
-
SHA1
6b21e610c0baa8ff538b3f37aaa278ec7273df27
-
SHA256
7f4751e57949ebca8744d1a05db8d88fbb50e3d1b5a47f64fd3c9dde32f0d178
-
SHA512
189333c674819f70cbcacd166c6135fc7b2a665b9b3e018b44e4915e5e2effe4622075331be094072bd3238022326ce193d03ef279097e19e583fd1c6d87e29d
-
SSDEEP
49152:Qoa1taC070d0i+IofI5CUnu7c5b9eGCC4JC8cZtz+CnWe3xP:Qoa1taC0PIofIZn8c5b95eJx2wEWeR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2412 4ECC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2412 4ECC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2524 3a9acdadcb5b097eff517b66615d27b6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2412 2524 3a9acdadcb5b097eff517b66615d27b6.exe 28 PID 2524 wrote to memory of 2412 2524 3a9acdadcb5b097eff517b66615d27b6.exe 28 PID 2524 wrote to memory of 2412 2524 3a9acdadcb5b097eff517b66615d27b6.exe 28 PID 2524 wrote to memory of 2412 2524 3a9acdadcb5b097eff517b66615d27b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9acdadcb5b097eff517b66615d27b6.exe"C:\Users\Admin\AppData\Local\Temp\3a9acdadcb5b097eff517b66615d27b6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3a9acdadcb5b097eff517b66615d27b6.exe BE4E77E81E5E84FF01FB97EFDC77407F40714B1413D8F844C9A24A7CB7E47C5393365415D77F037A65487925339F532F73D5D08F28268FEBCA6D552803C826612⤵
- Deletes itself
- Executes dropped EXE
PID:2412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5712cf34b7443467c557ec39e7bd6e48f
SHA142ee5d7fe57c68eb26e2b67a627a648b6e91e562
SHA256543264b273616cc21d407ebfe104503b6851a49486129964d3805b963ad53c43
SHA512a8b15b9094e945c3925a0d4c55f2a90a38afd7aac499862769eda40b8a706a5891a74a0c9d4520f4d3daf3abef1bb9290ed8780203ee685903240e92bbf954f5
-
Filesize
665KB
MD525a28d956cb07bbe745b569078742e29
SHA14c25a051ed151e9e13f5184499db3a732d82f98c
SHA2564ad29eebcc7f68d3ccac622d3ffc065c5b266160291ef734f7c1856562ed344c
SHA512634c9f1fde30ce6976fa7f9922289a8e1d44a0c90cf087d2e8075e04e6f1ee53d1af59d6cbc8c83a31679646f948daf632c481cf405e9502d882f3cf230bb346