Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
7a1235cf3138b6831956d0ad3db1781b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a1235cf3138b6831956d0ad3db1781b.exe
Resource
win10v2004-20231222-en
General
-
Target
7a1235cf3138b6831956d0ad3db1781b.exe
-
Size
744KB
-
MD5
7a1235cf3138b6831956d0ad3db1781b
-
SHA1
983ebfadb5114ee31f718768f47444594bcf4fdf
-
SHA256
552dd7d56d87f3f9716983234f608d0e05513c1bb740fc97cbace70895056c7a
-
SHA512
8748a85840b5c5f9787b6538784f7b354467168202bfdf15922a537f59818ed27982414cd5bda4d6002923e4a8239fa3f436e029e3471267765c98aac141942d
-
SSDEEP
12288:uaHc64b888888888888W888888888889jscV7TdjL47zdU5imqsX3sv33rD+zG/E:F86IIW7uvmQBsHUezG/aYFkJR30F6rp9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2792 7a1235cf3138b6831956d0ad3db1781b.tmp -
Loads dropped DLL 1 IoCs
pid Process 1244 7a1235cf3138b6831956d0ad3db1781b.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 7a1235cf3138b6831956d0ad3db1781b.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28 PID 1244 wrote to memory of 2792 1244 7a1235cf3138b6831956d0ad3db1781b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a1235cf3138b6831956d0ad3db1781b.exe"C:\Users\Admin\AppData\Local\Temp\7a1235cf3138b6831956d0ad3db1781b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\is-H0GBV.tmp\7a1235cf3138b6831956d0ad3db1781b.tmp"C:\Users\Admin\AppData\Local\Temp\is-H0GBV.tmp\7a1235cf3138b6831956d0ad3db1781b.tmp" /SL5="$30142,371795,121344,C:\Users\Admin\AppData\Local\Temp\7a1235cf3138b6831956d0ad3db1781b.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb