Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 19:34

General

  • Target

    41bafd236ec7a9748a708496acb77988.exe

  • Size

    82KB

  • MD5

    41bafd236ec7a9748a708496acb77988

  • SHA1

    b488c50839d80a1f25a3adc9b4fcbd57ca08137a

  • SHA256

    49e54bc633904cd7ee116442f928193ac417f565f8ed7e3312ea396ec44052ee

  • SHA512

    b7f280f48c61087d617304640cf02a570e91d73259bd68c9426c31f108a117709648cd1e4df3eb9a9233f97797d3e5116e18898777b9cc2dc28bd0962cd4e727

  • SSDEEP

    1536:mzJaIzOe2MKuxL2i4ghVFc8O0gPidKInR+mixOqzt3:FIzOg7rFNsi/n0Rxx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe
    "C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe
      C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2096

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe

          Filesize

          82KB

          MD5

          363981d4297d276126ad7a100bbe83ab

          SHA1

          c260084ee48d5c1ec5b839a3398681cb16a3f3b7

          SHA256

          d8ae17cee09f54a01e481e857f1e265fce35336446e316423a6b1f69ca8dd445

          SHA512

          fc8561d34dec9c9a8ec26e101001e2cc07df50c9d6da383584191e4696d53c88c1a451b85bf67ed04c9003317ad196eaa0b7be82b61b0d35d83d20e0e671a8d8

        • memory/2080-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2080-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2080-9-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/2080-12-0x0000000000190000-0x00000000001BF000-memory.dmp

          Filesize

          188KB

        • memory/2080-15-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2096-17-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/2096-23-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2096-28-0x00000000001A0000-0x00000000001BB000-memory.dmp

          Filesize

          108KB