Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
64f1c0343d9586b5f52d9818bc8c0e99.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
64f1c0343d9586b5f52d9818bc8c0e99.exe
Resource
win10v2004-20231215-en
General
-
Target
64f1c0343d9586b5f52d9818bc8c0e99.exe
-
Size
1.9MB
-
MD5
64f1c0343d9586b5f52d9818bc8c0e99
-
SHA1
59088b2de6e23076f64cf3870f963f9aab7fb3a2
-
SHA256
4430d0f9270bd2f8dbdb39af41d5935d09a581f3f748923779f72f5b2a7961b0
-
SHA512
60063eb5847a6fcb9b63660a80c2b450f575234fc3ab19fe2bf28e8ff7946f47d91f51eb657d197c75fd5e07819ca15240e9c5f96f81609d2869918f04d00383
-
SSDEEP
49152:Qoa1taC070dgP/eQZfZnmN41F2x5+zUnnLZZ:Qoa1taC0fGQZZmNOCAy7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2412 B18.tmp -
Executes dropped EXE 1 IoCs
pid Process 2412 B18.tmp -
Loads dropped DLL 1 IoCs
pid Process 1688 64f1c0343d9586b5f52d9818bc8c0e99.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2412 1688 64f1c0343d9586b5f52d9818bc8c0e99.exe 28 PID 1688 wrote to memory of 2412 1688 64f1c0343d9586b5f52d9818bc8c0e99.exe 28 PID 1688 wrote to memory of 2412 1688 64f1c0343d9586b5f52d9818bc8c0e99.exe 28 PID 1688 wrote to memory of 2412 1688 64f1c0343d9586b5f52d9818bc8c0e99.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f1c0343d9586b5f52d9818bc8c0e99.exe"C:\Users\Admin\AppData\Local\Temp\64f1c0343d9586b5f52d9818bc8c0e99.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\B18.tmp"C:\Users\Admin\AppData\Local\Temp\B18.tmp" --splashC:\Users\Admin\AppData\Local\Temp\64f1c0343d9586b5f52d9818bc8c0e99.exe EB3F09A23C2D6CAFD13D08F9F9C2A255C4A734DA3E81B37E8FE442B8BAEB65C12E972772954EE08DE707A4289C32F1D0F04612A2F80C16FAAF8ADF8D6E8EEEF82⤵
- Deletes itself
- Executes dropped EXE
PID:2412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5affe30199dfdf8d1e73c69627693840f
SHA1f862c5d784d95d03cbf0c0325538b6552781c8bc
SHA2560fe4b7af768d5c68eaee98f3f5625841dffe462f75f13cfd4f324f285a298464
SHA5122ddd79e0bdb821440a7d5309898f92f56248f0ab9914f5eb4c6a656481740d5556651986b8fa3ba814cb7507eeb44bde04a8dacd43db01aff7157eb11abc16c8
-
Filesize
1.3MB
MD51bf75a56df980525745999775ed4a06d
SHA1ca0fe7a2f5b3a25ebdac88377a39c9b39f8a7663
SHA2569752830281e398c6f962bbd4fa41ece1e026a2a8a68f40ae96f9fd8602a894f6
SHA512e8a99eb8eb9e7e9adcf94839f4513fa7a5d20e10543a42703524ad227f2dd08dc29c4b2be90eefb32cbc4f8cc2745691e90a816b8b6cdfaf4844ad2e7c451788