Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
737ef2d9818fad748ed464af0279c6a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
737ef2d9818fad748ed464af0279c6a6.exe
Resource
win10v2004-20231215-en
General
-
Target
737ef2d9818fad748ed464af0279c6a6.exe
-
Size
82KB
-
MD5
737ef2d9818fad748ed464af0279c6a6
-
SHA1
ec7bf9dff28db0000605f2e21d9ced3517a2d064
-
SHA256
771ce9d63e8aa3c9fe72e8972ca60e505c366206df68aad25b6166002a1eabf2
-
SHA512
305240b8a80f9efb1f07612e044672ffa3758bc3a308d9b406491a573a05140119f9931256fa0e08ddcd0e26deef0cf1bc3e9ed0b19c082f50a4a2f921672300
-
SSDEEP
1536:5GPwM6I6xh4SQj6H9SLErT+Gtz2U8aYSCzAL4VYIOrKbXN9du2:5GPwMT+4SQjkALqT+pVSCzrSIAT2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1920 737ef2d9818fad748ed464af0279c6a6.exe -
Executes dropped EXE 1 IoCs
pid Process 1920 737ef2d9818fad748ed464af0279c6a6.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 737ef2d9818fad748ed464af0279c6a6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2308 737ef2d9818fad748ed464af0279c6a6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2308 737ef2d9818fad748ed464af0279c6a6.exe 1920 737ef2d9818fad748ed464af0279c6a6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1920 2308 737ef2d9818fad748ed464af0279c6a6.exe 29 PID 2308 wrote to memory of 1920 2308 737ef2d9818fad748ed464af0279c6a6.exe 29 PID 2308 wrote to memory of 1920 2308 737ef2d9818fad748ed464af0279c6a6.exe 29 PID 2308 wrote to memory of 1920 2308 737ef2d9818fad748ed464af0279c6a6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\737ef2d9818fad748ed464af0279c6a6.exe"C:\Users\Admin\AppData\Local\Temp\737ef2d9818fad748ed464af0279c6a6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\737ef2d9818fad748ed464af0279c6a6.exeC:\Users\Admin\AppData\Local\Temp\737ef2d9818fad748ed464af0279c6a6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55ef9803a83727354bc1b12f0bbde039f
SHA1d6282a168dfc43bee8e1893f32e801b8816234ef
SHA256da2a2ea6b9321234b13d798ef671a4c673d7c0e91f5e6873d78b661c4f444cb1
SHA5123b5608c930035bdcdd70287706dfd31b3ae988057ceec02fcf60eedc593ae5ac233567ca5b76d78733752eaa0f2ecd932e85fa7e94dca1a648a35f4ee39cee1e