Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
7b3fad053f48326b3d69ce2ef83baf38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b3fad053f48326b3d69ce2ef83baf38.exe
Resource
win10v2004-20231215-en
General
-
Target
7b3fad053f48326b3d69ce2ef83baf38.exe
-
Size
7.0MB
-
MD5
7b3fad053f48326b3d69ce2ef83baf38
-
SHA1
304a1b55953b91822ee9b3eb4f8c6162eb39cf3e
-
SHA256
64e5b32569d9f0f8494b23e6ed44b0f5ab5fe96308751cf3c0b0bdbe82d88605
-
SHA512
0550fd571aed1a96a7925b4d3310bfb35132366cf48d072b6304a5337082c5d9b4c286e61a569c5152e9c1523894aad64a810aed6646cd1c86235bd42ddba9fb
-
SSDEEP
196608:ad/tGPPLAczgTTgvlHcQZyu2WyYGqGgujZ+FT+8LsOxtl:uULJcT0vlHtZyu2FLv5jtotl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3736 7b3fad053f48326b3d69ce2ef83baf38.tmp -
Loads dropped DLL 2 IoCs
pid Process 3736 7b3fad053f48326b3d69ce2ef83baf38.tmp 3736 7b3fad053f48326b3d69ce2ef83baf38.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3736 1492 7b3fad053f48326b3d69ce2ef83baf38.exe 87 PID 1492 wrote to memory of 3736 1492 7b3fad053f48326b3d69ce2ef83baf38.exe 87 PID 1492 wrote to memory of 3736 1492 7b3fad053f48326b3d69ce2ef83baf38.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\is-DH53H.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp"C:\Users\Admin\AppData\Local\Temp\is-DH53H.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp" /SL5="$6006A,6564690,780288,C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD55294b3139fb60c325957fc1dd663a494
SHA10af1a8b3652a7c973322c8b23c2598e462e13fa4
SHA256725b45973382a7fc599eaee8c9eb294d032962c7809852bdec13daa5df90b4cd
SHA5122d19d6abc62e59d59ace9ce56b36ffca59136dc202574433c864558ea66660cdd77fd572b11bb44b63a14ddc4863f4a80bb0c3eee7fc14df842d1c2e37e624cc
-
Filesize
29KB
MD5fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d