Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
75ea68522ed8ffd2b4c7010f59f6174a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75ea68522ed8ffd2b4c7010f59f6174a.exe
Resource
win10v2004-20231215-en
General
-
Target
75ea68522ed8ffd2b4c7010f59f6174a.exe
-
Size
57KB
-
MD5
75ea68522ed8ffd2b4c7010f59f6174a
-
SHA1
7670a6ce42c18d4cf53638b48fdec40f510b571f
-
SHA256
0709e3253813307184b2f29879c130ecc735f5a8a5eefdde362801f94da54ea3
-
SHA512
a7bd73044aad79bcb48f261740a55f4178e2aad68072689f43ddef0569b991d919af4b6dd2ce4d9233663c1b1e25ec76ea4d66dc79b9eb77f7bf8456e072fcd4
-
SSDEEP
1536:TVRIvAi3pVaS/ZsTK5GWUkJ5CqI0RBZfU:T8BphRsTsGiJ59IcBZfU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe 2332 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2332 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe 29 PID 2552 wrote to memory of 2332 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe 29 PID 2552 wrote to memory of 2332 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe 29 PID 2552 wrote to memory of 2332 2552 75ea68522ed8ffd2b4c7010f59f6174a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe"C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exeC:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD51b14470a3cffd5f195e04ded07399986
SHA1ed897b4aee8716bfa6710a858dec6e94b296ffaf
SHA256ebcb4bae065f0149cf728155001c7f081859e962e87fa8225d9dc9bdf0a351dc
SHA5129a9665526d259c2531dd99915e4d5c0c1cecf7694e80d56cc33009e60ab7b758d687538aa59123936d7850ce12c7013a044ed09a0c3aa6b9302605a069954cb7