Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
54a754131265004280d58098f4bca39e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54a754131265004280d58098f4bca39e.exe
Resource
win10v2004-20231215-en
General
-
Target
54a754131265004280d58098f4bca39e.exe
-
Size
8.2MB
-
MD5
54a754131265004280d58098f4bca39e
-
SHA1
1f788f6ce347196d2c7250b810b8777f3d584000
-
SHA256
fa5af0103d95c21f02bf9ca50356981fa7ce61a3a5cb508dc27bea666b813b6b
-
SHA512
54a7a97a8a72084e66a92514b7ec4fce3f2173707aae2f798cab4414ec8fa8ff6d4f0d80563185de43cfd7b6d547c3f40c473e0d7cb2fa72f278a0ac2b4dc454
-
SSDEEP
196608:N+v8w/WUVKgaPfHhv2Zi53myrX2uPEtZlF88KOGRBjV:0v8WWUVKTHBeZi5bYDKzRhV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1916 54a754131265004280d58098f4bca39e.tmp -
Loads dropped DLL 3 IoCs
pid Process 2988 54a754131265004280d58098f4bca39e.exe 1916 54a754131265004280d58098f4bca39e.tmp 1916 54a754131265004280d58098f4bca39e.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1916 54a754131265004280d58098f4bca39e.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28 PID 2988 wrote to memory of 1916 2988 54a754131265004280d58098f4bca39e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a754131265004280d58098f4bca39e.exe"C:\Users\Admin\AppData\Local\Temp\54a754131265004280d58098f4bca39e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\is-2G4HT.tmp\54a754131265004280d58098f4bca39e.tmp"C:\Users\Admin\AppData\Local\Temp\is-2G4HT.tmp\54a754131265004280d58098f4bca39e.tmp" /SL5="$500E0,8317800,67072,C:\Users\Admin\AppData\Local\Temp\54a754131265004280d58098f4bca39e.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD56ce3b0e6c7e1b77ffc0b918afa8a5884
SHA16f5b579665499a77b53d5e8b02693802cef929f6
SHA2569a45bb922c7b5332d19152e6a9ecdbf5e8f52a06df18d390475d533df8dd866f
SHA5124a343351ea6cfa9e4ee3ec542b20b74dbe25a4731c0c1d31cf994025e8a89b9580d1922116e0cc51ff6bb56a0a3567e139ec396174897ed3ca05de8410222515
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3