Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
751b894bd7388d3c08ff766e7c205b8b.exe
Resource
win7-20231215-en
General
-
Target
751b894bd7388d3c08ff766e7c205b8b.exe
-
Size
1.4MB
-
MD5
751b894bd7388d3c08ff766e7c205b8b
-
SHA1
e165945eb86812200b5f1b91e13ae00b16e041cf
-
SHA256
8d605c6f77fc8fc86fad54cdd64405f1e2793b8ff1165f54e6e2858f4bd16201
-
SHA512
aebc677097ba86540c31f9388f4640809427d80c35c07b7c4bfaa527ecf62add73b1b3b2eef9a4dd4f1ecd8227940bd81227376e674668a37a9dbdba28401bc8
-
SSDEEP
24576:qKeyxTAJj7PZFK30B3I9ILWDdhV1uBKqu/PJCBrxF/1vvz6D4SF66X:qKeyRAwEB3w7DbuBK18xF/1vvz6D4E6i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
yodcjhoq.exepid Process 2716 yodcjhoq.exe -
Loads dropped DLL 1 IoCs
Processes:
751b894bd7388d3c08ff766e7c205b8b.exepid Process 2984 751b894bd7388d3c08ff766e7c205b8b.exe -
Drops file in Program Files directory 1 IoCs
Processes:
751b894bd7388d3c08ff766e7c205b8b.exedescription ioc Process File created C:\Program Files (x86)\seqrxur\yodcjhoq.exe 751b894bd7388d3c08ff766e7c205b8b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
751b894bd7388d3c08ff766e7c205b8b.exedescription pid Process procid_target PID 2984 wrote to memory of 2716 2984 751b894bd7388d3c08ff766e7c205b8b.exe 28 PID 2984 wrote to memory of 2716 2984 751b894bd7388d3c08ff766e7c205b8b.exe 28 PID 2984 wrote to memory of 2716 2984 751b894bd7388d3c08ff766e7c205b8b.exe 28 PID 2984 wrote to memory of 2716 2984 751b894bd7388d3c08ff766e7c205b8b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\751b894bd7388d3c08ff766e7c205b8b.exe"C:\Users\Admin\AppData\Local\Temp\751b894bd7388d3c08ff766e7c205b8b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\seqrxur\yodcjhoq.exe"C:\Program Files (x86)\seqrxur\yodcjhoq.exe"2⤵
- Executes dropped EXE
PID:2716
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56ccc03e093ba35e18ff86d7a77e0ffcd
SHA1b12c94120fd2ca5ebc4b649bd13e563c6452e170
SHA25680c5d156bf33da60997838deeadde4b1eef61b1dd8e94513b23e58396f13908c
SHA51210960449569f989740739bfbd93ddfaa43c2bea959192b8e0c0dc93c46bbcaa29ee5526edfbe909e57ddf92e5ffde7af95363b18f21af4fa18d2850d55965acd
-
Filesize
1.2MB
MD58fade7d11be3f934c9c2b2cbd7429ceb
SHA16297edd31aeb81b683198fe0c1b9ff3ef5e9271b
SHA256d0861b81619e1610d92d4336b999126597753663127d7ef9c2260b945aa9cbcc
SHA5125f3a813c52d7fbca9852f7d895193fad2c3a05c91a98560088c7e623e596c5cebf901c0735fc908e125ac15a659434a35e27f2cf90a6fe7c7df4523d1896787b