Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
41f2fe6009441804e7368bcc5f00d47f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41f2fe6009441804e7368bcc5f00d47f.exe
Resource
win10v2004-20231222-en
General
-
Target
41f2fe6009441804e7368bcc5f00d47f.exe
-
Size
2.7MB
-
MD5
41f2fe6009441804e7368bcc5f00d47f
-
SHA1
d49ebb4ee7c2bf38030a0f23cc655380446b9c8c
-
SHA256
f809dfd68b236e19503d5d1f28fe2e4ddf3fb1488dfcd352e8f9ed8ef21e2bc4
-
SHA512
0bef96bb9c30bd75bd8acefa64c44b6f9d51f90b14c74950baf4bdf9d04425ae647ba7e5d49e957eb210bdee6d883922846e5f5281c71ccb898e07d18c102b32
-
SSDEEP
49152:5awRLbpEtTYMWegQpQukSVrtoI2etch+ocWurm+u/bQf0qPWoinXBgJ:QwZbpOT/KuvOI2wocLu/b5ZTRgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1904 41f2fe6009441804e7368bcc5f00d47f.tmp -
Loads dropped DLL 4 IoCs
pid Process 1928 41f2fe6009441804e7368bcc5f00d47f.exe 1904 41f2fe6009441804e7368bcc5f00d47f.tmp 1904 41f2fe6009441804e7368bcc5f00d47f.tmp 1904 41f2fe6009441804e7368bcc5f00d47f.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 41f2fe6009441804e7368bcc5f00d47f.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17 PID 1928 wrote to memory of 1904 1928 41f2fe6009441804e7368bcc5f00d47f.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f2fe6009441804e7368bcc5f00d47f.exe"C:\Users\Admin\AppData\Local\Temp\41f2fe6009441804e7368bcc5f00d47f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\is-1V61T.tmp\41f2fe6009441804e7368bcc5f00d47f.tmp"C:\Users\Admin\AppData\Local\Temp\is-1V61T.tmp\41f2fe6009441804e7368bcc5f00d47f.tmp" /SL5="$5014C,2392013,54272,C:\Users\Admin\AppData\Local\Temp\41f2fe6009441804e7368bcc5f00d47f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1904
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD552e122b34d0acfb487ad2f654c1d7e80
SHA13990f9e7aac8d6c35ecc8a18e7afd317acbe0ea3
SHA256040780e0bc1c5d32064e2f311b769473af298ac53bee0b2397c694d4f6b7465e
SHA512c0b29f91c7260fa6c7f33e40a0e0a0eeef94fdadda8d3a765f3bec1ea27ec325cd6196306c3b554957dab6bc8df53f148e55256780c153668cb03cceb4b89430
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
49KB
MD502ecc74f7f91e9ffd84de708683236a6
SHA13532de0b77df8b0fc89e9c7eddec3fa71f98f5a2
SHA25630ad8a0e1cee091ca48c771adb2e76baf1a7d54b9f60dc47f54dfdc2d6f6691e
SHA512a3fdaa651f82428395bc412a2a04fce673768d3ef088b3748addf337d95464eb141ae7c286bff5c705eae05dd7b38207629588ae7e89ada15269463cd7acf541