Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
4c8aacc00786fb2a5c5523fa7802e65e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c8aacc00786fb2a5c5523fa7802e65e.exe
Resource
win10v2004-20231215-en
General
-
Target
4c8aacc00786fb2a5c5523fa7802e65e.exe
-
Size
4.2MB
-
MD5
4c8aacc00786fb2a5c5523fa7802e65e
-
SHA1
ecf0c194069cd00608af27a68def3276b59499a2
-
SHA256
a7010ae73f73ccf766491be6b474481da31cadf131b92a83069b0b611fec81da
-
SHA512
49a479dac23ec16d5ff4e1195b8e34ee8f48ae46be6038cc8b7d306329ab621e9fe7560940a1818335ccdb49bb3aab6e02c07e4d7e6f7b30f20cd0bc3c98c0f2
-
SSDEEP
98304:emhd1UryeviswYF+VLUjH5oxFbxCVLUjH5oxFbx:elPiVC+VUjZEdCVUjZEd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2460 1AD1.tmp -
Loads dropped DLL 1 IoCs
pid Process 1776 4c8aacc00786fb2a5c5523fa7802e65e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2460 1776 4c8aacc00786fb2a5c5523fa7802e65e.exe 28 PID 1776 wrote to memory of 2460 1776 4c8aacc00786fb2a5c5523fa7802e65e.exe 28 PID 1776 wrote to memory of 2460 1776 4c8aacc00786fb2a5c5523fa7802e65e.exe 28 PID 1776 wrote to memory of 2460 1776 4c8aacc00786fb2a5c5523fa7802e65e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c8aacc00786fb2a5c5523fa7802e65e.exe"C:\Users\Admin\AppData\Local\Temp\4c8aacc00786fb2a5c5523fa7802e65e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4c8aacc00786fb2a5c5523fa7802e65e.exe BA60AAE76C8B041D61E66B760525809D9E377C3D9BAC155196A82C4A7F69F1A0E0C0B8A2B82CD1CBC69C5322DF1E84A4A6742FEF89607C83210DCEA011CABCA22⤵
- Executes dropped EXE
PID:2460
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD517f78e9674076e998bd4f3b2277c31ee
SHA16ec902617e2ce7ccf818d2ac25bbb2227fa962b6
SHA256259e6c23258cca93e377c79a23b109fc12c13e1f48cd69995640570f79942037
SHA51211c362e0b05828f27fc80a3a8d1623ab2f53efce9f36e8b23ee56d57c445a9e9132a1d159b078cdd241911bea8e6e7ee32977ff49747ce1dff4a5628dca642ec
-
Filesize
419KB
MD5e7a1ad983d4b8d94bad731db5073a8e4
SHA17647b116f287677012ad7aaf570883933d7da95d
SHA256b17ae05851ced3e0ba3d1ed2e90427b37c7f3ca55ddc6f18f59b85c89cea0674
SHA512aab6f979ce1d5bd3c25f226772ed0498edc4803dc3c1845ad67259589f5c969e638e5a6ef4f4b46b5da4ee07c1643418f1c58ff6c3968acac117836cff7446a6