Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
7065ed7aa619a21a86bf07c9fe926b1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7065ed7aa619a21a86bf07c9fe926b1a.exe
Resource
win10v2004-20231215-en
General
-
Target
7065ed7aa619a21a86bf07c9fe926b1a.exe
-
Size
1.9MB
-
MD5
7065ed7aa619a21a86bf07c9fe926b1a
-
SHA1
f866a1c530ac3663f91736b7672d887dc687490f
-
SHA256
114e5e6fc4c985c603e1da8e1d41fd5a47ea5adb52590321c47fa11b885a5002
-
SHA512
6dfe818f5ad987228c5373feb6ddc8a494596cb59d831b57abbdaea4912b0606c5e065e6008e8b5b9b4b1ae790ec70609e55467eaf58da9f196dec2f2bd52cbb
-
SSDEEP
49152:Qoa1taC070dpIdidzzhX4xSgetDzBdHBTk71uwdUOAdLC:Qoa1taC0vdicS/tDzrHBTkkwdUOAdLC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 4EAC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2396 4EAC.tmp -
Loads dropped DLL 1 IoCs
pid Process 1964 7065ed7aa619a21a86bf07c9fe926b1a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2396 1964 7065ed7aa619a21a86bf07c9fe926b1a.exe 28 PID 1964 wrote to memory of 2396 1964 7065ed7aa619a21a86bf07c9fe926b1a.exe 28 PID 1964 wrote to memory of 2396 1964 7065ed7aa619a21a86bf07c9fe926b1a.exe 28 PID 1964 wrote to memory of 2396 1964 7065ed7aa619a21a86bf07c9fe926b1a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe"C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\4EAC.tmp"C:\Users\Admin\AppData\Local\Temp\4EAC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe D3ECF9425C011F237D91A5A979C6E6FF7CBA3A07E82D1A888119D5F28B6A47DEFCB52A864B51D2A3022E4EB47DE5E06512E474C1AD72E3093FC75D1AB73D7D482⤵
- Deletes itself
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD58d07ef99c3d74fa45efcd76eaec9c792
SHA16b4de5c8bc908403cdf8d03859ddc16f22480771
SHA256eb39830c4cafa9e5b6859c64b1933c7e324b614af62e6119f10cb90eaa26afe3
SHA512a4d3f6e8cfbeb4107ec69ceeb1887af116b0e2341137e261687719dd2ac1162043a14798b960a5f5eb7fdc51ce63cf529e485b5ea10989c227bab155d1db64cf