Analysis
-
max time kernel
93s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
7065ed7aa619a21a86bf07c9fe926b1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7065ed7aa619a21a86bf07c9fe926b1a.exe
Resource
win10v2004-20231215-en
General
-
Target
7065ed7aa619a21a86bf07c9fe926b1a.exe
-
Size
1.9MB
-
MD5
7065ed7aa619a21a86bf07c9fe926b1a
-
SHA1
f866a1c530ac3663f91736b7672d887dc687490f
-
SHA256
114e5e6fc4c985c603e1da8e1d41fd5a47ea5adb52590321c47fa11b885a5002
-
SHA512
6dfe818f5ad987228c5373feb6ddc8a494596cb59d831b57abbdaea4912b0606c5e065e6008e8b5b9b4b1ae790ec70609e55467eaf58da9f196dec2f2bd52cbb
-
SSDEEP
49152:Qoa1taC070dpIdidzzhX4xSgetDzBdHBTk71uwdUOAdLC:Qoa1taC0vdicS/tDzrHBTkkwdUOAdLC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4448 E84D.tmp -
Executes dropped EXE 1 IoCs
pid Process 4448 E84D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4448 4844 7065ed7aa619a21a86bf07c9fe926b1a.exe 88 PID 4844 wrote to memory of 4448 4844 7065ed7aa619a21a86bf07c9fe926b1a.exe 88 PID 4844 wrote to memory of 4448 4844 7065ed7aa619a21a86bf07c9fe926b1a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe"C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe 4E07217FEA4BBDD83C32FC7DCE81851D34EB3F7055F1BEBDFA2A278FCCF205C14B1F8578537D9A35B5225C02029824E2DEFE872941D60916D49FDE5DA576D4612⤵
- Deletes itself
- Executes dropped EXE
PID:4448
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5efcaf07ba04f0ca6c8a9f77dd80ded6b
SHA1e134c4d96459072b89b76de0065928f46d9cd308
SHA256df697d50ae9115870cb48ba07186e862a51dc32fa852a39bc47da6cb8c7ff8ce
SHA512e2a16769a470735c579a37b6e222f2a7aca3a2fdde3d7ccef9659256c224c6061bc0cd35329bcef65b86f90edbc53e74b249d91d4059df02a8d132c217808917