Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 09:37

General

  • Target

    4df913ce49b576b541c9f1491fa35578.exe

  • Size

    3.5MB

  • MD5

    4df913ce49b576b541c9f1491fa35578

  • SHA1

    7e95d5a188bdc0f0cbbb9760540e51ae14071531

  • SHA256

    23f4cf3bd27ada231b8e24cd453e2c795fa0618e858c0b696aaae5ec2fd78991

  • SHA512

    9ef62d7b4cef8243af046f1f1d0a2167ef5b67b1d0a93f121227769bbf48991983674d9d9a715c1cdccb91655debf40b8ef227212daa69d4eaaf8ae889a40431

  • SSDEEP

    49152:j+UF5eIfqkVn/Bja5TyHPuK4AK4WXpMtOEcC86TNo5RcfzxgBfokwUkR1lKU/MGO:HF8XOZjaIPT4NIOPC8gbflgwUu3ChQ4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe
    "C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\is-5CRPD.tmp\4df913ce49b576b541c9f1491fa35578.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5CRPD.tmp\4df913ce49b576b541c9f1491fa35578.tmp" /SL5="$4010A,3230774,140800,C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2532

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2232-1-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2232-15-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2532-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2532-16-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2532-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB