Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
7522a5a4d1520a14aac119771083d991.exe
Resource
win7-20231215-en
General
-
Target
7522a5a4d1520a14aac119771083d991.exe
-
Size
81KB
-
MD5
7522a5a4d1520a14aac119771083d991
-
SHA1
404b05132cdca767e40b253500d54166c41ef13f
-
SHA256
bc014d182d2d1d3794b9eba539c0399103003b348f5b3cab468ac02f902c60cf
-
SHA512
7eb3db2f4f1d56c99904875733a084c30a293225ea104769e3ce0f5eae806960fdd04a21216a95f1afefdff09cfb13a1b5a8f4554837c04f453b3afcb82442bd
-
SSDEEP
1536:hpsMAiV5wD8/4Qr+0b1Y6aK82bdXnBDng431mTdxs:hpsMnuI/Z+41YvK8UXBDng4lmdS
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exepid process 2392 7522a5a4d1520a14aac119771083d991.exe -
Executes dropped EXE 1 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exepid process 2392 7522a5a4d1520a14aac119771083d991.exe -
Loads dropped DLL 1 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exepid process 2492 7522a5a4d1520a14aac119771083d991.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exepid process 2492 7522a5a4d1520a14aac119771083d991.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exe7522a5a4d1520a14aac119771083d991.exepid process 2492 7522a5a4d1520a14aac119771083d991.exe 2392 7522a5a4d1520a14aac119771083d991.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7522a5a4d1520a14aac119771083d991.exedescription pid process target process PID 2492 wrote to memory of 2392 2492 7522a5a4d1520a14aac119771083d991.exe 7522a5a4d1520a14aac119771083d991.exe PID 2492 wrote to memory of 2392 2492 7522a5a4d1520a14aac119771083d991.exe 7522a5a4d1520a14aac119771083d991.exe PID 2492 wrote to memory of 2392 2492 7522a5a4d1520a14aac119771083d991.exe 7522a5a4d1520a14aac119771083d991.exe PID 2492 wrote to memory of 2392 2492 7522a5a4d1520a14aac119771083d991.exe 7522a5a4d1520a14aac119771083d991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7522a5a4d1520a14aac119771083d991.exe"C:\Users\Admin\AppData\Local\Temp\7522a5a4d1520a14aac119771083d991.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7522a5a4d1520a14aac119771083d991.exeC:\Users\Admin\AppData\Local\Temp\7522a5a4d1520a14aac119771083d991.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5381a7268c08ceed53fca7bcbd255748d
SHA12b49c64c60613b23679c0460ac5f16bc16860e7a
SHA2565b0eb6846018e26ec09a241e99056c6203ebb5d77aa02205736c8616d06a2a29
SHA51270c6891dad484c8a4e41cf99ca5379b7a42fb158d7594a1f27d2a150d0af148a5a884aba36ba201a63c943fdf1644cb8bdf1d0fce9f4ad9ca9f9df22c6dc952a