Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
729760d208d4bd2ceef37717ce6148c2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
729760d208d4bd2ceef37717ce6148c2.exe
Resource
win10v2004-20231215-en
General
-
Target
729760d208d4bd2ceef37717ce6148c2.exe
-
Size
776KB
-
MD5
729760d208d4bd2ceef37717ce6148c2
-
SHA1
351100a366a2b3050e6eac0d75963b5c3081abb4
-
SHA256
880f3e4cbcbd14361b568e6e38f12dab0ef623aae64bfa1e39cbdd5b5cac9f50
-
SHA512
4cc0be77e3f721f7afefe9653ffe96d94d74bd6c2ab3d458299ac32fae02162470d97cbe159f77ce20fb1de60d07e8586b3a670dd7b2b2f16ad4d744dc380053
-
SSDEEP
12288:5na9oi4F0IAa548D5gQZHWata+2CzSXU5NL+CSPzuQjIstcvS38LCJQBtdGs1rBw:5naSkaZVHWa7GEMIakS3rJQBtUkBgJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 729760d208d4bd2ceef37717ce6148c2.tmp -
Loads dropped DLL 5 IoCs
pid Process 2928 729760d208d4bd2ceef37717ce6148c2.exe 2996 729760d208d4bd2ceef37717ce6148c2.tmp 2996 729760d208d4bd2ceef37717ce6148c2.tmp 2996 729760d208d4bd2ceef37717ce6148c2.tmp 2996 729760d208d4bd2ceef37717ce6148c2.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 729760d208d4bd2ceef37717ce6148c2.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16 PID 2928 wrote to memory of 2996 2928 729760d208d4bd2ceef37717ce6148c2.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe"C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp"C:\Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp" /SL5="$3012E,433886,54272,C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5799b7d524b9669552e64cbab8b85f950
SHA193aa37ff499998d72aff3b4d921eea2ba86e2ea4
SHA25673f4944d6d284f1f06924028e4b954faa20dd95e7850f17f58ea8055e7443105
SHA5127a72a9f72616a504599cb4755bb0b0f3b65e880dd4b0831e94d5282de61e6decd3a316cd08d166a0482bbeefb9deb3ab1cf5b1d6586778dae1f2541a67e30f4d
-
Filesize
259B
MD5c9db0b7a1497a721ecb2692a83b2d3c8
SHA107a35b088a8cf909cdadb551772e45177461c7bf
SHA2563d9f4f64d306fcadfc37e1c84c219059dacd63e9a492a663d4f780d2fa0ec134
SHA512e9ee21d68ce95c6676be40d9bec0adaa9920fdf51f9d778c0ac7bff36a07736faf1b3342478a9bd34718763295af9fc75c020ad1eec56d6115014864eaad52cf
-
Filesize
126KB
MD53cd642e3019f3326572b2f03747ac3a5
SHA130e93dd01f24d715b48555e4bf8db2236b7839e1
SHA256f39b9e174424d5f6210362789ad69cfcd2e22a3fe54e96a571de701552087aa7
SHA512c15b601a91e469ee579b711bf5ba0376e024b8e69ff156a914ff4707f4b1914a3c3ce1f679d2ec8d910b5e530e27aa7a1856669cd819c2213d6acab374dc3bcf
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
8KB
MD5468e4f658084fa350469b4d9f4221cb6
SHA11090bcce7758f30a9974daf99c5bece07589d3e8
SHA256f832fb2b0f4a7fd1e8acee9bad4bf0ba7697939e42e8675fa352ebc02bfc9e2f
SHA512a381d23242a8d0117241a741a42f35b5407732405d831fbb284236ce2564ebbe9ed8c9178194989d51dfcc6a1eca8dcc1e7f8cdd843fc32379bff4e4e03cb240
-
Filesize
1KB
MD5c47fba22a433b368596405ec17330071
SHA169817481bfca2db34ac65dab83630a0c4952af8d
SHA25648c1b4d2da869d1535d61d338e3f56b1e9994b9b82355f894fe843d901842e2b
SHA5120d4504893dbb1c9ca312e38b181d00303d9e763376668fadaf08a659f1c117ddc3163ae071c04d20b7af25137813e489c1ea866f73b0cc8f63b49a3e68891dc3
-
Filesize
45KB
MD56d5bae7333e6e3be95d51cb3d98ceb5d
SHA1de9df9cb573ed1a69baf80c1432fec7a8533138e
SHA2568387fdcc4c9036283bc65452f023924dbcf0a4941c744d757ac82fdf550dc895
SHA512d08505a1fd42fdeb6c75e4641e28629f6227594e5e3f569378fc88a2858187bfc71552eb7204054e7165dd18e10f9d0749020495d31fee20f61c6273d244151b