Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
74f42c6a3baa806243b8f0c9155e2b84.exe
Resource
win7-20231129-en
General
-
Target
74f42c6a3baa806243b8f0c9155e2b84.exe
-
Size
82KB
-
MD5
74f42c6a3baa806243b8f0c9155e2b84
-
SHA1
41aa7d0b4e0f2e2108e402ff41c0f651f45253f2
-
SHA256
86aae9883aa73e79cb571f3eff548f3c31f225db13a01b0a9f8de92c7a384c9b
-
SHA512
2e99d1b53e81a62bb200461781ce74e2fa6ee154bd8c24cfb2eb154ad2ac205ef2865dd48bb3e0f78b1999c034bbfaf016d57bacaa467cd3bba7b4c9631a86b2
-
SSDEEP
1536:Q13X0P/eR9hYpfQgUSr+5djCbkQhn5YPphNolGKv:Q1nE3US65lCbT+hhGos
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 74f42c6a3baa806243b8f0c9155e2b84.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 74f42c6a3baa806243b8f0c9155e2b84.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 74f42c6a3baa806243b8f0c9155e2b84.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 74f42c6a3baa806243b8f0c9155e2b84.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2872 74f42c6a3baa806243b8f0c9155e2b84.exe 3048 74f42c6a3baa806243b8f0c9155e2b84.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3048 2872 74f42c6a3baa806243b8f0c9155e2b84.exe 29 PID 2872 wrote to memory of 3048 2872 74f42c6a3baa806243b8f0c9155e2b84.exe 29 PID 2872 wrote to memory of 3048 2872 74f42c6a3baa806243b8f0c9155e2b84.exe 29 PID 2872 wrote to memory of 3048 2872 74f42c6a3baa806243b8f0c9155e2b84.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f42c6a3baa806243b8f0c9155e2b84.exe"C:\Users\Admin\AppData\Local\Temp\74f42c6a3baa806243b8f0c9155e2b84.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\74f42c6a3baa806243b8f0c9155e2b84.exeC:\Users\Admin\AppData\Local\Temp\74f42c6a3baa806243b8f0c9155e2b84.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b21055ed26e7be81bbe3d592b17e2d27
SHA15e2091723f9be86e21ad03e4f3d283e0c70363c9
SHA256871c28230a06abbcb13b7b7e0f20f00850b859b6c6a2c51bc1f53b60c19a6dee
SHA5125acd1ea9ac831f6a1c0968a7c19168fd2d1488bb24d3c39317fa557a7b396854387d2c35ad56c206273f51e2aacb95fc94a261b9e4dba1bc087a410a9d6bc37b