Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2024 16:32

General

  • Target

    65808808b47cd51e29391bb8b58d9516.exe

  • Size

    162KB

  • MD5

    65808808b47cd51e29391bb8b58d9516

  • SHA1

    7977c7f522be43d410035172b073380fb7b39b1a

  • SHA256

    c59802aebcaacf688dba0c8ade39f7ffffe7915405e2caa074499f9a5bbff23f

  • SHA512

    3cb0f84ba0ed50ba92044954b451c7b28ffc3de8e0d2656cabc78d67fca5932655d2339879b9cdcd6d4fc2f4515084bd6707583e31f8b93eb7ba01278d3b4d29

  • SSDEEP

    3072:WQP+aAywNocW3ULRajiegfo4Ndp+cDSUG210krWIMYYV9Z7jhxdktQK5WvYGEBhT:7+Dy3UNajEl+CSUWzV/79ziQK5WvYJB5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
    "C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
      C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe

    Filesize

    162KB

    MD5

    446613c6491f092c8d5ae5a4b0bcb3e1

    SHA1

    94a2c82b50e55949c15bdd7d2c58ae927d84ff9e

    SHA256

    0095dd2566309487da85ba943420af2170e5e84013d46ace84b788f04982f084

    SHA512

    bc55cbd16ecee648298cbbd5d4772e2e91da828de84592cab2e8a260d76d12b77d8924916935fcad8d53e039f9baa801fdfa469e73262e9a04ad53e98618a5df

  • memory/2184-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2184-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2184-2-0x0000000000140000-0x000000000016E000-memory.dmp

    Filesize

    184KB

  • memory/2184-12-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/2184-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2268-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2268-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2268-28-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB