Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 23:49

General

  • Target

    477ba6fffbe7437c49ebbf7592115308.exe

  • Size

    82KB

  • MD5

    477ba6fffbe7437c49ebbf7592115308

  • SHA1

    e10759f6e65ca8bee17c5b33af296e035c14bf33

  • SHA256

    3ae0fa10b815536d4ee5222c1d22f3dd7605f2786d576a01bb5f2b49b7c2d235

  • SHA512

    e6e6a450060f97e9c1f0ce81e1281a6f61e9abc6b2ee29f1ea3f513c3e9312135ad8f36779e47c86baaf24a363167a99f585d8510d7e7fc5e32422fbac6814e1

  • SSDEEP

    1536:RQd3PpqcBIu+8iCkErV+eywGmNs/35cSJK8KKO8GiE6elHz68TwcK3yrQW:RcRqce0RkErtGmN7SJLHOFiE6elTNT1L

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe
    "C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe
      C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe

    Filesize

    82KB

    MD5

    28700434a589a5fad2a4c288b7cd8087

    SHA1

    844ca1215da56e3ae535d285b80fc4c2ca9b7432

    SHA256

    58a84762074a081618c85a8b5e7ed1ad34b66701630bec807a76a3c70d193a9d

    SHA512

    e904542edbb9a4791490a58d4aed91d431666329e8d16781c69624006427803f425064afb7658789f2d2740a53c7aa3e70fcb1cc455cec76041475cb48baa981

  • memory/2476-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2476-2-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/2476-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2476-12-0x00000000001A0000-0x00000000001CF000-memory.dmp

    Filesize

    188KB

  • memory/2696-18-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2696-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2696-28-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB