Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
3d766c84e461185c75eac23a1301aca2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d766c84e461185c75eac23a1301aca2.exe
Resource
win10v2004-20231215-en
General
-
Target
3d766c84e461185c75eac23a1301aca2.exe
-
Size
288KB
-
MD5
3d766c84e461185c75eac23a1301aca2
-
SHA1
3e51f6bbec5b93dbe1bfb1e0644c1c9cc796e0da
-
SHA256
c296272cff2761194306d42734eca403bd223e1320d11e046925c30ff90c8f0c
-
SHA512
cdb38c16930a4e47c7d4fabbd3a66425ba6f8328ac81fde7160ccc2572ef4e6e5c231544b9cec391477783c2a0c732a39474f6f200bc779bdbcf3a58fd6d4a3a
-
SSDEEP
6144:uj/s+B7gcPAe04fphafTdlHjaCJQU9LE3KFIxQj:YE+dgsv04BharbD9tj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2732 712A.tmp -
Loads dropped DLL 3 IoCs
pid Process 3064 3d766c84e461185c75eac23a1301aca2.exe 3064 3d766c84e461185c75eac23a1301aca2.exe 3064 3d766c84e461185c75eac23a1301aca2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3064 3d766c84e461185c75eac23a1301aca2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2732 3064 3d766c84e461185c75eac23a1301aca2.exe 28 PID 3064 wrote to memory of 2732 3064 3d766c84e461185c75eac23a1301aca2.exe 28 PID 3064 wrote to memory of 2732 3064 3d766c84e461185c75eac23a1301aca2.exe 28 PID 3064 wrote to memory of 2732 3064 3d766c84e461185c75eac23a1301aca2.exe 28 PID 3064 wrote to memory of 2812 3064 3d766c84e461185c75eac23a1301aca2.exe 29 PID 3064 wrote to memory of 2812 3064 3d766c84e461185c75eac23a1301aca2.exe 29 PID 3064 wrote to memory of 2812 3064 3d766c84e461185c75eac23a1301aca2.exe 29 PID 3064 wrote to memory of 2812 3064 3d766c84e461185c75eac23a1301aca2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d766c84e461185c75eac23a1301aca2.exe"C:\Users\Admin\AppData\Local\Temp\3d766c84e461185c75eac23a1301aca2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\712A.tmpC:\Users\Admin\AppData\Local\Temp\712A.tmp2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\3d766c84e461185c75eac23a1301aca2.exe"C:\Users\Admin\AppData\Local\Temp\3d766c84e461185c75eac23a1301aca2.exe" --cp "C:\Users\Admin\AppData\Local\Temp\8E8A.tmp"2⤵PID:2812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5cf40c5476ec238496661ad1271a9a163
SHA1f568ed2fac2d98980c56d5bc97186d97164096f9
SHA256043cce5786f63a890a5ee8bd8b796db6d02e779151cf1e209acbde8e0e71b5f2
SHA5121b56e1354cab16ba9d857c7507e9fe6724d76978ab1fa63a72787b51ee1e49250a863c8a5f721b2d3c7dc7cd3b46f557fff51302f7d5eae229919aa0f30beb29
-
Filesize
288KB
MD5270886bf981b57ea084cdd0e19b57392
SHA119a37ea042484a339cc7db8934b3803da7567feb
SHA2562c5114762781f9f77105663f998bbab8b7e5079396011e1f220dba7ec237a3a4
SHA51216e317ad8409dde543aaa300234a459733959f291414ec0eb20c601dd42eca821468429ff787c18742205faa44ada7f1482b72cf4197eae156625f967e36bb03