Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
3fd275c11b763f7cc9361440bbee6608.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3fd275c11b763f7cc9361440bbee6608.exe
Resource
win10v2004-20231222-en
General
-
Target
3fd275c11b763f7cc9361440bbee6608.exe
-
Size
1.9MB
-
MD5
3fd275c11b763f7cc9361440bbee6608
-
SHA1
dad3f99c7771ec5421b9423b8af4a5cad447a619
-
SHA256
fcd8d4e1013e026ea9fc3a034bd4c977c57b04d7a085e6bbe73b16bc39a01006
-
SHA512
1e7afe25ab46cd3caa6b4f994dd9a2b3e4912dc9dbb4adf134040f46ccb69a5ca37bed85838e37c04bf0ca4f902cac84c0bfaed4e9f18dbec71659bdd5d6747e
-
SSDEEP
49152:Qoa1taC070djuFbvbUp1kZOV4QR0y7cmOdX5:Qoa1taC0guRrZA4QR7/WX5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 9A2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2372 9A2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2184 3fd275c11b763f7cc9361440bbee6608.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2372 2184 3fd275c11b763f7cc9361440bbee6608.exe 28 PID 2184 wrote to memory of 2372 2184 3fd275c11b763f7cc9361440bbee6608.exe 28 PID 2184 wrote to memory of 2372 2184 3fd275c11b763f7cc9361440bbee6608.exe 28 PID 2184 wrote to memory of 2372 2184 3fd275c11b763f7cc9361440bbee6608.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fd275c11b763f7cc9361440bbee6608.exe"C:\Users\Admin\AppData\Local\Temp\3fd275c11b763f7cc9361440bbee6608.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\9A2.tmp"C:\Users\Admin\AppData\Local\Temp\9A2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3fd275c11b763f7cc9361440bbee6608.exe C4C5D8F42AFBEED2981349C329716240FF14DFF69D78CBC8CF07A9B476861308436198B6916BA711C110784A9B658AB3D8C21929B3F64D36F56B2DCCD05CF9602⤵
- Deletes itself
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD52e1643991f4e5dd753fc1f8c2d5deab0
SHA1aa7507d07ad8ec45fb3cb2865d735139d321e846
SHA256b1fec435c0c47953013eda92d1275b3c5c2f69135e4e2b6f4d65cad4a684a9d3
SHA5129fb7cad137f3992c0a9ad8bc5f8ec06caa18e14a4ab08a4a9954862d812eb78598c60836781f294a888b5ec91345b96e48543352695bc6ba05495dfece050ea6
-
Filesize
590KB
MD5eea82fb7850aee35e76cc77e0933a30e
SHA132d93ff847491aaaa37c7ca88b8d125f0ab5addc
SHA2563ff72acadab4397b77491725c2638f3cb67c4c526b1af8cdf3c55dfece435915
SHA512427fda7eed781bae0bca0341176b4450fa929ac745c6dc7d21f3b23adb731f7130b27d03c184b173692ed1345f95888001bf73c97ce214886854eb0c59f5b3da