Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
75165840510f229c87e212e6a792e33e.exe
Resource
win7-20231215-en
General
-
Target
75165840510f229c87e212e6a792e33e.exe
-
Size
1.6MB
-
MD5
75165840510f229c87e212e6a792e33e
-
SHA1
a1854455b67c9c07f643fd233414af92ec0015c6
-
SHA256
2a7f14a00653a7c485a156c93ddf9c0609554842c08767fd8b8dbe39e984b21c
-
SHA512
a687845077e7d1075326f29c0efd3d30c8df4d1cae644fa29088e9fb72fb55cdb7876a8101319b82dbfe68f1db673c4f82f37681e8b5d2d839aeb3b1c6e6c959
-
SSDEEP
49152:bWaOgkzoCUs7El8/SlgeWzx/ZRTHAsn9qsyTY26tMc:izv3EC/9Z3Tgsn9192O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 75165840510f229c87e212e6a792e33e.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 75165840510f229c87e212e6a792e33e.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 75165840510f229c87e212e6a792e33e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 75165840510f229c87e212e6a792e33e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 75165840510f229c87e212e6a792e33e.exe 2096 75165840510f229c87e212e6a792e33e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2096 2808 75165840510f229c87e212e6a792e33e.exe 28 PID 2808 wrote to memory of 2096 2808 75165840510f229c87e212e6a792e33e.exe 28 PID 2808 wrote to memory of 2096 2808 75165840510f229c87e212e6a792e33e.exe 28 PID 2808 wrote to memory of 2096 2808 75165840510f229c87e212e6a792e33e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75165840510f229c87e212e6a792e33e.exe"C:\Users\Admin\AppData\Local\Temp\75165840510f229c87e212e6a792e33e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\75165840510f229c87e212e6a792e33e.exeC:\Users\Admin\AppData\Local\Temp\75165840510f229c87e212e6a792e33e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD59693a08b29e896dd47d3127bd2a71b35
SHA1af818ab04ccf6d7e218b17e9f5f7a98a0772867f
SHA2568452a5e59b9dfd30a777fb33015713d03aa260b2fdae6e9302eec414255b1c35
SHA512f09b051572e4fb455adf23f61576c2396c5e0079969edbf121595fb564d4ebf40ba8c49440299f7eeb52dcdeb8c65099d28409a635b85518df60b1276549fdb6
-
Filesize
910KB
MD53dcf41588519b5d59467912c1c1002d9
SHA1578d00a2bfd024c623e492d9159f9d23e624797b
SHA256317010a4482cdcd30fc6c90807ddfa2723ab3024b19defcdc660c2074c099fe0
SHA512fd02fefbd9967f45264733cdb0e7cc8dd53a891f1551a1a564b0065f81f4915852fe8885e6ae0aa710b9b32af2876514918dba58ef2556ffc8ff994342b5ddb5