Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:16

General

  • Target

    7511a6065a89a6112cef52767cc7e4d5.exe

  • Size

    3.0MB

  • MD5

    7511a6065a89a6112cef52767cc7e4d5

  • SHA1

    5b6a67824968d918b7dbdfb5e8e44b207b16c1d6

  • SHA256

    667eea281435836e7fbeb42879d95a8fb41a1327a4fe6af2e696e3b767657b05

  • SHA512

    a5dbf7fb2a4e78359a33fab6afab3524e5e6fe081886f298e574ff9d16e4182e77b962d25c538b611872fa984042f8f75b1f2ef9b7b63860270cb5d63117fb10

  • SSDEEP

    49152:8qeNVewort4DG3/eoEcnNL3kTq5sz3ISxUzZknRnNl5M6Yqi6e79tUkMS2Df5JC:JEcJrt4DqeqNL3kdzhxUNuNl5M6YqLej

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe
    "C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp" /SL5="$30150,2406299,780800,C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp
    Filesize

    2.1MB

    MD5

    ceb62fa863423d3b4db2546d6ee90c1e

    SHA1

    83372a2ddf3f12f6412eebe5994b132658ae9b57

    SHA256

    e755bdce011ff86e11694edb1d404aed24bb3cb569ee7f0759c858624abfba2c

    SHA512

    b0bb82dc3b6a55801a61dca67434e360e1725aaacc4b2d31dff08fe840d9e472d2b4021a078275082de9d3c29e1c3ff7d2481c4655db5369671b0ed8976f6a67

  • \Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp
    Filesize

    2.5MB

    MD5

    3b3d034eef9bc9d652e9e3d834f68abe

    SHA1

    005bef3b9e0a5990241b0cad23a2118f8ef1a441

    SHA256

    869413c0e3194585bbab998f02382cff2b1001ba0b1bcfbf30edaf9e14b09ee7

    SHA512

    3bc9d197932e8349daafe34f340886b7f72b0b7366e25882644183a85dd1d59a6c7691989f3e17aa8137293b9f3ee403d6ca5986bd66c88fc082a1c1919ecba1

  • memory/2244-7-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2244-10-0x0000000000400000-0x0000000000682000-memory.dmp
    Filesize

    2.5MB

  • memory/2244-13-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2496-0-0x0000000000400000-0x00000000004CC000-memory.dmp
    Filesize

    816KB

  • memory/2496-9-0x0000000000400000-0x00000000004CC000-memory.dmp
    Filesize

    816KB