Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 03:19
Static task
static1
Behavioral task
behavioral1
Sample
429fa7f28111e3b8ad7c5f714a0ba514.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
429fa7f28111e3b8ad7c5f714a0ba514.exe
Resource
win10v2004-20231215-en
General
-
Target
429fa7f28111e3b8ad7c5f714a0ba514.exe
-
Size
1.9MB
-
MD5
429fa7f28111e3b8ad7c5f714a0ba514
-
SHA1
ffe22983b0170bd13ed03f0e555f4b61746c6036
-
SHA256
30264c779cab6232419dea34d694e88a4f33faff4b8f370a6fbcb4f358a1333b
-
SHA512
c3b6c63cc09df06e74598206b582b9d712d6213de81da2e3cea7ed363e9498c6f2195fc29912fa53cdf9d06bf1220cc004eff2736dbdb4c4d295b53d6884e8fd
-
SSDEEP
49152:Qoa1taC070dFhdQbYAR/O9yreR/z2ujGlM5:Qoa1taC0qgYARW9yr250w
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1444 6F3.tmp -
Executes dropped EXE 1 IoCs
pid Process 1444 6F3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2940 429fa7f28111e3b8ad7c5f714a0ba514.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1444 2940 429fa7f28111e3b8ad7c5f714a0ba514.exe 28 PID 2940 wrote to memory of 1444 2940 429fa7f28111e3b8ad7c5f714a0ba514.exe 28 PID 2940 wrote to memory of 1444 2940 429fa7f28111e3b8ad7c5f714a0ba514.exe 28 PID 2940 wrote to memory of 1444 2940 429fa7f28111e3b8ad7c5f714a0ba514.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe"C:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\6F3.tmp"C:\Users\Admin\AppData\Local\Temp\6F3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe A5FC1035AEEFEDA15CAEA6DF678820D6BACA3A29235B24AD47B381C5C8EAADDA418E02615C20324F2B8231C88C8334AD820D38359268C63E2D80B82E2F871E8D2⤵
- Deletes itself
- Executes dropped EXE
PID:1444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD51e8c6d89faa7409eff61e88de89147bb
SHA19f372e1eb5403e24e130823dc752a16948268925
SHA2563535617cc5d0c470cabee2c3d0d941724c5f5ecbd58edeeb11d02fcf291d32f0
SHA512ed8f353219b02d3a48f7a5254663c7ee14216dddc9571a468907394ce0e89fa3deafee37de8149feae8c6a21f3a2425f1c12d5df2b5b93805a13bb1bbafa3cad
-
Filesize
890KB
MD5e930c8feddd993acac4e6411255cecf6
SHA14ce479d3823ad59e14697e0257cb4a75a14fcf47
SHA256a35c01902294a2c5e885062a556d60160984a837869ecc5c5ccb1c0fdeb7d9b3
SHA512e3ca6784f41bc011fd8f7d9ad0bb98e52bb1ee45cfa4a029e94cf15096bef5886bb3b6dc09f3615962b90c037bc7e4d5dc57e514c176b7a01cc18869c7f64cd4