Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe
Resource
win10v2004-20231215-en
General
-
Target
3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe
-
Size
23.5MB
-
MD5
3d8f1a6a4b4ae1bc98bce6e892dc8df4
-
SHA1
1aa6be5a398c0bc0de92ade08f283d21cce15804
-
SHA256
ec9a8638c7bd5afecbc9345c9582f1b7d57efada1529397e59a6bc6dcf9e2e9a
-
SHA512
c312ba3410c760d1506507df580248e38ec7d0910a845a2f7f69971ac314e0b5fb85b9ed8ee8f2c304c67619b72391f8e2e9adb751b4efeec077450187cdce49
-
SSDEEP
393216:vtLZ/++X7D2pTVWh+LHYywjaTD7OW9uPtCQoVihjFmS0uzamEanoH:1LlD2pT/L7KCuPtC28S1aKnG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1292 3d8f1a6a4b4ae1bc98bce6e892dc8df4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 3d8f1a6a4b4ae1bc98bce6e892dc8df4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28 PID 2000 wrote to memory of 1292 2000 3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe"C:\Users\Admin\AppData\Local\Temp\3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\is-GUIKE.tmp\3d8f1a6a4b4ae1bc98bce6e892dc8df4.tmp"C:\Users\Admin\AppData\Local\Temp\is-GUIKE.tmp\3d8f1a6a4b4ae1bc98bce6e892dc8df4.tmp" /SL5="$7011E,24279100,57856,C:\Users\Admin\AppData\Local\Temp\3d8f1a6a4b4ae1bc98bce6e892dc8df4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49