Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe
Resource
win10v2004-20231222-en
General
-
Target
54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe
-
Size
1.1MB
-
MD5
54bc2e1ac1d8f88dbd5f5a52dd739a2d
-
SHA1
43542fa03a2d839084fb0f0e6fd44f63eb76e649
-
SHA256
c55b692a2d41ac645a064d6d806f3dbda737ee6d483492635bab36baefd64ddb
-
SHA512
1590a425249d8e9d29d941379a255193d38fc82b8ee5f01988630c89b54bf8f5d0a5e7b2031c13bb4edd1c6c2cdd648ba9ad5597c4db94980b78c9ba2baa40f6
-
SSDEEP
24576:SypW9SgLNZaOdcTMuUvxIgaADhJvawLsO9eR6GkeKx/mxbnAHdyZvLRG:St9SgLNZa6xINhwZAaeKx/ibnAevLg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2896 422E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2896 422E.tmp -
Loads dropped DLL 1 IoCs
pid Process 1724 54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2896 1724 54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe 28 PID 1724 wrote to memory of 2896 1724 54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe 28 PID 1724 wrote to memory of 2896 1724 54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe 28 PID 1724 wrote to memory of 2896 1724 54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe"C:\Users\Admin\AppData\Local\Temp\54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\422E.tmp"C:\Users\Admin\AppData\Local\Temp\422E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\54bc2e1ac1d8f88dbd5f5a52dd739a2d.exe 9832F124E5560443B944A6B332981A22A4D5CC79D21A09BEABBFFF305F7FF9DB365B6C2D1E8255888D01D47478D2C590155F1B1605787DCE9952655CFF46DEFF2⤵
- Deletes itself
- Executes dropped EXE
PID:2896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50714e0703a0bef60f22ca29a1b874a70
SHA139c060281b53ae87b0741da53ff8cef38c90d0c3
SHA256e48a536518932e922c7dc665fb60b8503835000761a2e570f1da8d3257c699fd
SHA51282636e9c14fa2fbcf89bd5c8ab1caeeb15693ec698e26056f82e261e71029cdd6ae8596a71cd4479684ba341c6c26c8becd619e243503536d54e8102754dfdd1