Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
60ec4f50407678fd87ed94d8c3c256a7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
60ec4f50407678fd87ed94d8c3c256a7.exe
Resource
win10v2004-20231215-en
General
-
Target
60ec4f50407678fd87ed94d8c3c256a7.exe
-
Size
1.9MB
-
MD5
60ec4f50407678fd87ed94d8c3c256a7
-
SHA1
08cc4250cd1aaa6ca072119301035a488f30eb8b
-
SHA256
271d96ddad86ff872b44ba88f31218ac98c6280fa3a4aafe20bd7814b58cc59e
-
SHA512
b5ba0e3021cc4715dc35ff0854be877cfe34454b1173fb817edeb89be1aee520693ca0fd2955063381919ac4a9e15b3e70e496788bddd6e8934bfccaa1772875
-
SSDEEP
49152:Qoa1taC070dZ3RFnKqZN0lKuBdVibd/O6pNkPX:Qoa1taC0C3HkrVibU6iX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 FDDF.tmp -
Executes dropped EXE 1 IoCs
pid Process 2668 FDDF.tmp -
Loads dropped DLL 1 IoCs
pid Process 1696 60ec4f50407678fd87ed94d8c3c256a7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2668 1696 60ec4f50407678fd87ed94d8c3c256a7.exe 28 PID 1696 wrote to memory of 2668 1696 60ec4f50407678fd87ed94d8c3c256a7.exe 28 PID 1696 wrote to memory of 2668 1696 60ec4f50407678fd87ed94d8c3c256a7.exe 28 PID 1696 wrote to memory of 2668 1696 60ec4f50407678fd87ed94d8c3c256a7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\60ec4f50407678fd87ed94d8c3c256a7.exe"C:\Users\Admin\AppData\Local\Temp\60ec4f50407678fd87ed94d8c3c256a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\FDDF.tmp"C:\Users\Admin\AppData\Local\Temp\FDDF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\60ec4f50407678fd87ed94d8c3c256a7.exe C3512B90483F4E3503C7FDC265794D61CE2CAF3EAF48FF2DAD64CA641A248E090E4BECC061A19562A021274BC0A4EB453E00D8B3F70604708731B97C5E47F2E32⤵
- Deletes itself
- Executes dropped EXE
PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5388beb8d56919e01b693342f0bbcc15c
SHA11d0f311d57e68515399e00b3572ff4cdf3effa3e
SHA256e7b299aeb16cb5d968cfea0f106a69cfd3f022dd4062863e90112e1e9da26096
SHA512e34e5ea8c630d5f4f83c2088ace5dd15396321d77044a00126df63d3cec00c6d25ca58fa487112ca20f976ea2d996a6a78c6faae38c1db38a0c540a26953c934