Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
5a92e74a0390cc648ba65aafdbfe26b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a92e74a0390cc648ba65aafdbfe26b2.exe
Resource
win10v2004-20231215-en
General
-
Target
5a92e74a0390cc648ba65aafdbfe26b2.exe
-
Size
1.9MB
-
MD5
5a92e74a0390cc648ba65aafdbfe26b2
-
SHA1
72a0764107e9d7634d5740896ec53206bc261909
-
SHA256
392a0cd5175dc645ce24804ce0509d7dcfbccacc389459cefda55272ded5d5d4
-
SHA512
8b2ef21d2299861f3734b12074443ed86808cfd1129d05dff0191d024a06a80a9b19f53227446ac715dd14b28a5500b2e04e3c9972224ad517b73669b1032349
-
SSDEEP
49152:Qoa1taC070d2bsnKmq6crGyS7H2FveFaOAii:Qoa1taC0j4ZcrGYFvqS3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 BC4.tmp -
Executes dropped EXE 1 IoCs
pid Process 2300 BC4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2732 5a92e74a0390cc648ba65aafdbfe26b2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2300 2732 5a92e74a0390cc648ba65aafdbfe26b2.exe 28 PID 2732 wrote to memory of 2300 2732 5a92e74a0390cc648ba65aafdbfe26b2.exe 28 PID 2732 wrote to memory of 2300 2732 5a92e74a0390cc648ba65aafdbfe26b2.exe 28 PID 2732 wrote to memory of 2300 2732 5a92e74a0390cc648ba65aafdbfe26b2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a92e74a0390cc648ba65aafdbfe26b2.exe"C:\Users\Admin\AppData\Local\Temp\5a92e74a0390cc648ba65aafdbfe26b2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\BC4.tmp"C:\Users\Admin\AppData\Local\Temp\BC4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5a92e74a0390cc648ba65aafdbfe26b2.exe 362880FF55E603112BB05EE1C979CDF276BA300E13EE9315ED38F2D20084BC9522149C355BA2421F21A732F1D814C3F5F91B5758AFC953F0599D262DFA0582332⤵
- Deletes itself
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD58c587cc12e51e32e7785d199c27be97a
SHA1d7f92f735a686f52459e6e4a4fdf4e46503458a7
SHA256519db887b6d51d6a362f31f0b2025e3d666f14ebe25a3034c1cbd90081976d4b
SHA512d8541f3aae771991763843f65dac5b9e165bf00d7e2c7a104ca44bfc12e0ae1b20c13d74e184f3524546d230022b751ba653e369cc12f9d3deea7f35f75ee267