Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 03:19

General

  • Target

    429fa7f28111e3b8ad7c5f714a0ba514.exe

  • Size

    1.9MB

  • MD5

    429fa7f28111e3b8ad7c5f714a0ba514

  • SHA1

    ffe22983b0170bd13ed03f0e555f4b61746c6036

  • SHA256

    30264c779cab6232419dea34d694e88a4f33faff4b8f370a6fbcb4f358a1333b

  • SHA512

    c3b6c63cc09df06e74598206b582b9d712d6213de81da2e3cea7ed363e9498c6f2195fc29912fa53cdf9d06bf1220cc004eff2736dbdb4c4d295b53d6884e8fd

  • SSDEEP

    49152:Qoa1taC070dFhdQbYAR/O9yreR/z2ujGlM5:Qoa1taC0qgYARW9yr250w

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe
    "C:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\6F3.tmp
      "C:\Users\Admin\AppData\Local\Temp\6F3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\429fa7f28111e3b8ad7c5f714a0ba514.exe A5FC1035AEEFEDA15CAEA6DF678820D6BACA3A29235B24AD47B381C5C8EAADDA418E02615C20324F2B8231C88C8334AD820D38359268C63E2D80B82E2F871E8D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6F3.tmp

    Filesize

    313KB

    MD5

    1e8c6d89faa7409eff61e88de89147bb

    SHA1

    9f372e1eb5403e24e130823dc752a16948268925

    SHA256

    3535617cc5d0c470cabee2c3d0d941724c5f5ecbd58edeeb11d02fcf291d32f0

    SHA512

    ed8f353219b02d3a48f7a5254663c7ee14216dddc9571a468907394ce0e89fa3deafee37de8149feae8c6a21f3a2425f1c12d5df2b5b93805a13bb1bbafa3cad

  • \Users\Admin\AppData\Local\Temp\6F3.tmp

    Filesize

    890KB

    MD5

    e930c8feddd993acac4e6411255cecf6

    SHA1

    4ce479d3823ad59e14697e0257cb4a75a14fcf47

    SHA256

    a35c01902294a2c5e885062a556d60160984a837869ecc5c5ccb1c0fdeb7d9b3

    SHA512

    e3ca6784f41bc011fd8f7d9ad0bb98e52bb1ee45cfa4a029e94cf15096bef5886bb3b6dc09f3615962b90c037bc7e4d5dc57e514c176b7a01cc18869c7f64cd4

  • memory/1444-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2940-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB