Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
4d95d74d6d76b2d81a9d5b8983b1d5e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d95d74d6d76b2d81a9d5b8983b1d5e9.exe
Resource
win10v2004-20231215-en
General
-
Target
4d95d74d6d76b2d81a9d5b8983b1d5e9.exe
-
Size
1.9MB
-
MD5
4d95d74d6d76b2d81a9d5b8983b1d5e9
-
SHA1
d6040bc0d85c1c4c532e40b442b71f004ff0dbe5
-
SHA256
ef15de748f01f1fc6de0cd5f4963f569a3f1b3c1be8094bfc79b965a471f2c14
-
SHA512
c2da05d79f3bcff03b10161650f17afd7542b7133c644bab97ddb51c4a0c8ac1e41f15a77879e7aa0b6ea4b302742a3744632199ddff55d2482daf16889a1394
-
SSDEEP
49152:Qoa1taC070dAp9m84OK3ull4hZT6oZT10:Qoa1taC0DaDYMuox10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 6C79.tmp -
Executes dropped EXE 1 IoCs
pid Process 2356 6C79.tmp -
Loads dropped DLL 1 IoCs
pid Process 2204 4d95d74d6d76b2d81a9d5b8983b1d5e9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2356 2204 4d95d74d6d76b2d81a9d5b8983b1d5e9.exe 28 PID 2204 wrote to memory of 2356 2204 4d95d74d6d76b2d81a9d5b8983b1d5e9.exe 28 PID 2204 wrote to memory of 2356 2204 4d95d74d6d76b2d81a9d5b8983b1d5e9.exe 28 PID 2204 wrote to memory of 2356 2204 4d95d74d6d76b2d81a9d5b8983b1d5e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d95d74d6d76b2d81a9d5b8983b1d5e9.exe"C:\Users\Admin\AppData\Local\Temp\4d95d74d6d76b2d81a9d5b8983b1d5e9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\6C79.tmp"C:\Users\Admin\AppData\Local\Temp\6C79.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4d95d74d6d76b2d81a9d5b8983b1d5e9.exe 8A7DD33E6FDB799776FD3119F03B6641137A807D6DF661776765D805E8DE9E6902E41E641AAA8BC899FC4D8690FCB631DE7F18C9CD06495D01BE9287247D50302⤵
- Deletes itself
- Executes dropped EXE
PID:2356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5caea7d7cf94b1c76a06c83f6630ed42c
SHA13d6e604946674d73b43e841623f64f6ac59532ee
SHA256d8d83ae0b74b353df29cb02597aca0c975a2af559de137d061498a80bdc0ddb3
SHA512338bdb936cb0e9e9f0e6d3976d03da2be4d0cb489aa536c6e4a71baa732998e20ab7dae452953638e6c48f727b07babba88dfc3266e22747df9d84b2913f1d42
-
Filesize
1.9MB
MD5ced4cd750368dafdfd172f9fc25fc246
SHA19e5891599ff6ee5475bad52ab960f3165d90bf5c
SHA2569265b775189a58539a90aa60e788c076608d3b520bf42750b4bc60f07b6d37bc
SHA51288a83d5e078e7a8b31264a6e17a9cbbf952cd63de061a90ab3886941fe173cfeb6e5590e0576f77a9c144cb9b759d50ed1fb4296cf6692703d543dec4d8aedf2