Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
7521127b4c17dddb95de16f7ac206a7f.exe
Resource
win7-20231215-en
General
-
Target
7521127b4c17dddb95de16f7ac206a7f.exe
-
Size
84KB
-
MD5
7521127b4c17dddb95de16f7ac206a7f
-
SHA1
f3446785fac84a4abcc6836964ad5d6416c96b38
-
SHA256
21dca41b3e9fbda8dff300d4e8b17bbcfa05b8f53a2bf6021d93affeeab9503e
-
SHA512
a4098f815cef68ba6bcfe94c9b06284bf2e83f6204fdbb5574b72b857be48c6bcad40abf256ba02c4a4ef865eadc561d7604096da0d8ac7404886b5b6918fc57
-
SSDEEP
1536:zmjH0ihMIEfzAekMxcK9Whgo5YxkV1RXksYtBbbfh:aD0cMIYzArMS8Whgo51lYJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exepid process 2220 7521127b4c17dddb95de16f7ac206a7f.exe -
Executes dropped EXE 1 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exepid process 2220 7521127b4c17dddb95de16f7ac206a7f.exe -
Loads dropped DLL 1 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exepid process 1644 7521127b4c17dddb95de16f7ac206a7f.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exepid process 1644 7521127b4c17dddb95de16f7ac206a7f.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exe7521127b4c17dddb95de16f7ac206a7f.exepid process 1644 7521127b4c17dddb95de16f7ac206a7f.exe 2220 7521127b4c17dddb95de16f7ac206a7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7521127b4c17dddb95de16f7ac206a7f.exedescription pid process target process PID 1644 wrote to memory of 2220 1644 7521127b4c17dddb95de16f7ac206a7f.exe 7521127b4c17dddb95de16f7ac206a7f.exe PID 1644 wrote to memory of 2220 1644 7521127b4c17dddb95de16f7ac206a7f.exe 7521127b4c17dddb95de16f7ac206a7f.exe PID 1644 wrote to memory of 2220 1644 7521127b4c17dddb95de16f7ac206a7f.exe 7521127b4c17dddb95de16f7ac206a7f.exe PID 1644 wrote to memory of 2220 1644 7521127b4c17dddb95de16f7ac206a7f.exe 7521127b4c17dddb95de16f7ac206a7f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7521127b4c17dddb95de16f7ac206a7f.exe"C:\Users\Admin\AppData\Local\Temp\7521127b4c17dddb95de16f7ac206a7f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\7521127b4c17dddb95de16f7ac206a7f.exeC:\Users\Admin\AppData\Local\Temp\7521127b4c17dddb95de16f7ac206a7f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a7414ae1a49c4af9668edb213dd21be0
SHA1679bfda9e3b2e89d285d05959c76e9670e9edbd5
SHA2564d397fba991bec0abe43d6211745ff7b69a5a0da4bb744da321dcb0cb585e6a9
SHA512721277fa0926e358dc9f09da1741a32727b41fb73207ba6c7dece85ec188aa6338f54e7dfa867775d8d1fcdcacc9d6c06296b8d9b403396501163967158187d5