Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
4e08b465598bcf41caa7b191915adb98.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e08b465598bcf41caa7b191915adb98.exe
Resource
win10v2004-20231222-en
General
-
Target
4e08b465598bcf41caa7b191915adb98.exe
-
Size
1.9MB
-
MD5
4e08b465598bcf41caa7b191915adb98
-
SHA1
9e88e6d0e9c6bdd157836a847839c58e1614c43d
-
SHA256
809c8d34ca988549e59309d4c66998ebbc5b39dcb1b4cbcc7e014810ea2cc595
-
SHA512
3ca95c9d7bbc80aeb8a24f8d5c1e886b7877b3e48ff0cd47cea90d5898629a0254db45e5542da1fdfcfcf4d20b370eaa72efe73fb07d023ae76af83cf19a6062
-
SSDEEP
49152:Qoa1taC070dnTa3FWXk1kwKi/ZBsJN78DhD7qPBFoO:Qoa1taC0YEFqk1kk4Gt8b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 A6C.tmp -
Executes dropped EXE 1 IoCs
pid Process 3040 A6C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2976 4e08b465598bcf41caa7b191915adb98.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3040 2976 4e08b465598bcf41caa7b191915adb98.exe 28 PID 2976 wrote to memory of 3040 2976 4e08b465598bcf41caa7b191915adb98.exe 28 PID 2976 wrote to memory of 3040 2976 4e08b465598bcf41caa7b191915adb98.exe 28 PID 2976 wrote to memory of 3040 2976 4e08b465598bcf41caa7b191915adb98.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e08b465598bcf41caa7b191915adb98.exe"C:\Users\Admin\AppData\Local\Temp\4e08b465598bcf41caa7b191915adb98.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\A6C.tmp"C:\Users\Admin\AppData\Local\Temp\A6C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4e08b465598bcf41caa7b191915adb98.exe EE26FD57A4BA62A3B2F95B6BA57905A1216796EE752C5240D2C4BDAD9E8C7CA431579FBC2AE02B8DF136D6941550D9B38A8524ECEEDCC9364660A592BFFE3D602⤵
- Deletes itself
- Executes dropped EXE
PID:3040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD5dc4ca2ac02a8e81e79f61dc27a7d3a54
SHA1023dcb48df6c4881b473df106aed68a38b7df4c1
SHA2563abf6bf64c05eb8122732cf62fbfba7e3ff99eb879cf529dc2d9b38c3a993f17
SHA512edc14562952defa0b63cc25817b7e65620629029dafcbe41a8edb5b778ac7746ce9f82771b789cb58dee4f19ba8e3af1a42b360fdd53e4b2f09c033bb3625c8d
-
Filesize
747KB
MD5bf9e169a790409c63cf61630575213c6
SHA111d47d981f0558541667c2bf41372028514f0eea
SHA256a5fb8ce2315647f5c5c535b9047715461810bf14a7a310367494fa99dc48f39e
SHA51215c3812469a36cc327f922abe49bee0882f0a5d78ad1821dcfdf2f8ecd16242bfeaba0bb8f644d585f80f22c9a494fb335f0791c154577607e047681d04256f1