Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
7764058ce508b410a9fa210a77c03b63.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7764058ce508b410a9fa210a77c03b63.exe
Resource
win10v2004-20231222-en
General
-
Target
7764058ce508b410a9fa210a77c03b63.exe
-
Size
88KB
-
MD5
7764058ce508b410a9fa210a77c03b63
-
SHA1
c85eef5b94ddca97719e69631de10ad3c88cfa92
-
SHA256
9c56f99fa857c08edd11edfd006572fef3caaa43e05c5f7467673ac32f259714
-
SHA512
95fbad75e66c44fd3519b57b18f518468137443a23bb9db1d5d2dfecec28bcee3becf94a6bf36343d8d39dd9fd17cb47cac6edb3754773d38e5fe876df18f4f7
-
SSDEEP
1536:qf5rVaW+1tSeeHwdQ2w/f7MJzRU60WUiZ8gRZJosvl6bRnhFZG:qf5cavHwdQ2wro30AZ8GM66bRnhFZG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2460 cmd.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\java\AFF995DC4281.dll 7764058ce508b410a9fa210a77c03b63.exe File created C:\Windows\java\AFF995DC4281.exe 7764058ce508b410a9fa210a77c03b63.exe File opened for modification C:\Windows\java\AFF995DC4281.exe 7764058ce508b410a9fa210a77c03b63.exe File created C:\Windows\1.bat 7764058ce508b410a9fa210a77c03b63.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 2460 760 7764058ce508b410a9fa210a77c03b63.exe 28 PID 760 wrote to memory of 2460 760 7764058ce508b410a9fa210a77c03b63.exe 28 PID 760 wrote to memory of 2460 760 7764058ce508b410a9fa210a77c03b63.exe 28 PID 760 wrote to memory of 2460 760 7764058ce508b410a9fa210a77c03b63.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7764058ce508b410a9fa210a77c03b63.exe"C:\Users\Admin\AppData\Local\Temp\7764058ce508b410a9fa210a77c03b63.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\1.bat2⤵
- Deletes itself
PID:2460
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5479c5525ac94f6d4e5836f0e7d42ee5b
SHA1582f584797d1f7cb614471e1c621520ffd303731
SHA256e5d67712680154d5e11901b38e83e3d22bc3e3ece37fac1cf0f5d60ad85bb983
SHA512d83268c7bcb8ff9e1c0d728c88f8a2fa6361da1ad271af1b4d45bc61af0a9ee3142c49da3468facf08f4a45ec339d97aa51e60e0361dc4f5286f8b891e8727f6