Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
739593e031c30ee9f922f846e0e720f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
739593e031c30ee9f922f846e0e720f7.exe
Resource
win10v2004-20231222-en
General
-
Target
739593e031c30ee9f922f846e0e720f7.exe
-
Size
1.9MB
-
MD5
739593e031c30ee9f922f846e0e720f7
-
SHA1
845e29fc0e8063355b7f49474e9d9c96a4c78b06
-
SHA256
4f9b71510fe96a12b125aa24e5f1bd029964fb200a10bf624cfc00983d78f6b3
-
SHA512
415ec479eaf8f7405bfaf30a9e42009bed3d1c03e05bb1f892f8e63cd7193e8d3a9c2c530c43a1e239fd78957dceaabed38393d61b08959981cf760890b871b9
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dJGeH0I9oavLY2VdloiO/Ygn/N8xI0RMoEvyC:Qoa1taC070dJG7KoazdPEniNRZEZSK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 602A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2472 602A.tmp -
Loads dropped DLL 1 IoCs
pid Process 1756 739593e031c30ee9f922f846e0e720f7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2472 1756 739593e031c30ee9f922f846e0e720f7.exe 28 PID 1756 wrote to memory of 2472 1756 739593e031c30ee9f922f846e0e720f7.exe 28 PID 1756 wrote to memory of 2472 1756 739593e031c30ee9f922f846e0e720f7.exe 28 PID 1756 wrote to memory of 2472 1756 739593e031c30ee9f922f846e0e720f7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\739593e031c30ee9f922f846e0e720f7.exe"C:\Users\Admin\AppData\Local\Temp\739593e031c30ee9f922f846e0e720f7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\602A.tmp"C:\Users\Admin\AppData\Local\Temp\602A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\739593e031c30ee9f922f846e0e720f7.exe 6F2E8398EC946F2E755F71EDE5CF4D2F064CF59697AF39E6E72EDE8A34200301E53E6E5B93472E0B3BBB44164C3A7BBC9C92D172EC4646F794F4E23B49F914D02⤵
- Deletes itself
- Executes dropped EXE
PID:2472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d21bb68437a374a6298b3972bee3d8ae
SHA19ac4403f52e8397985ef0cebe64ab226a60c302f
SHA256fb6cfe9ae4a6e9422fc17e62e134f71fc1598bdd263b4da3037105d7f7ae4977
SHA512bf8ffe6ac6409715822d57ef418f2f943df1ef4634d41787abb62d252862087a870e44bc1c52563ee1a3abfef72a4b8ea0c27cc39470542e01c94f0f5aac3f59