Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
7511a6065a89a6112cef52767cc7e4d5.exe
Resource
win7-20231215-en
General
-
Target
7511a6065a89a6112cef52767cc7e4d5.exe
-
Size
3.0MB
-
MD5
7511a6065a89a6112cef52767cc7e4d5
-
SHA1
5b6a67824968d918b7dbdfb5e8e44b207b16c1d6
-
SHA256
667eea281435836e7fbeb42879d95a8fb41a1327a4fe6af2e696e3b767657b05
-
SHA512
a5dbf7fb2a4e78359a33fab6afab3524e5e6fe081886f298e574ff9d16e4182e77b962d25c538b611872fa984042f8f75b1f2ef9b7b63860270cb5d63117fb10
-
SSDEEP
49152:8qeNVewort4DG3/eoEcnNL3kTq5sz3ISxUzZknRnNl5M6Yqi6e79tUkMS2Df5JC:JEcJrt4DqeqNL3kdzhxUNuNl5M6YqLej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
7511a6065a89a6112cef52767cc7e4d5.tmppid process 2244 7511a6065a89a6112cef52767cc7e4d5.tmp -
Loads dropped DLL 1 IoCs
Processes:
7511a6065a89a6112cef52767cc7e4d5.exepid process 2496 7511a6065a89a6112cef52767cc7e4d5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7511a6065a89a6112cef52767cc7e4d5.tmppid process 2244 7511a6065a89a6112cef52767cc7e4d5.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7511a6065a89a6112cef52767cc7e4d5.exedescription pid process target process PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp PID 2496 wrote to memory of 2244 2496 7511a6065a89a6112cef52767cc7e4d5.exe 7511a6065a89a6112cef52767cc7e4d5.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe"C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp"C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmp" /SL5="$30150,2406299,780800,C:\Users\Admin\AppData\Local\Temp\7511a6065a89a6112cef52767cc7e4d5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2244
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmpFilesize
2.1MB
MD5ceb62fa863423d3b4db2546d6ee90c1e
SHA183372a2ddf3f12f6412eebe5994b132658ae9b57
SHA256e755bdce011ff86e11694edb1d404aed24bb3cb569ee7f0759c858624abfba2c
SHA512b0bb82dc3b6a55801a61dca67434e360e1725aaacc4b2d31dff08fe840d9e472d2b4021a078275082de9d3c29e1c3ff7d2481c4655db5369671b0ed8976f6a67
-
\Users\Admin\AppData\Local\Temp\is-SUJPA.tmp\7511a6065a89a6112cef52767cc7e4d5.tmpFilesize
2.5MB
MD53b3d034eef9bc9d652e9e3d834f68abe
SHA1005bef3b9e0a5990241b0cad23a2118f8ef1a441
SHA256869413c0e3194585bbab998f02382cff2b1001ba0b1bcfbf30edaf9e14b09ee7
SHA5123bc9d197932e8349daafe34f340886b7f72b0b7366e25882644183a85dd1d59a6c7691989f3e17aa8137293b9f3ee403d6ca5986bd66c88fc082a1c1919ecba1
-
memory/2244-7-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2244-10-0x0000000000400000-0x0000000000682000-memory.dmpFilesize
2.5MB
-
memory/2244-13-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2496-0-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/2496-9-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB