Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7e1dec9963f3ef50032fbe0d2b140611.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e1dec9963f3ef50032fbe0d2b140611.exe
Resource
win10v2004-20231222-en
General
-
Target
7e1dec9963f3ef50032fbe0d2b140611.exe
-
Size
1.9MB
-
MD5
7e1dec9963f3ef50032fbe0d2b140611
-
SHA1
ece1e0134b70078f7f74300dbd4085a8ec3e5442
-
SHA256
40700a2b542f96a5f563a74aa01f95854e77e28a2db51233fbe3e3c328098277
-
SHA512
8fa9d53c00ec070aa15269eb5ebcb5df5509c0898723790c226bfa817c5234bb4ac25dc571bdb854806c54935795cc2d13b100c7621667e67a0621a39544cf00
-
SSDEEP
49152:Qoa1taC070dodcILZfwP+Ln2Lpdn905u2iLtXd9/3gxR:Qoa1taC0082Lzn90Q2qN9/3iR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 14C8.tmp -
Executes dropped EXE 1 IoCs
pid Process 3024 14C8.tmp -
Loads dropped DLL 1 IoCs
pid Process 2440 7e1dec9963f3ef50032fbe0d2b140611.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3024 2440 7e1dec9963f3ef50032fbe0d2b140611.exe 28 PID 2440 wrote to memory of 3024 2440 7e1dec9963f3ef50032fbe0d2b140611.exe 28 PID 2440 wrote to memory of 3024 2440 7e1dec9963f3ef50032fbe0d2b140611.exe 28 PID 2440 wrote to memory of 3024 2440 7e1dec9963f3ef50032fbe0d2b140611.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1dec9963f3ef50032fbe0d2b140611.exe"C:\Users\Admin\AppData\Local\Temp\7e1dec9963f3ef50032fbe0d2b140611.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\14C8.tmp"C:\Users\Admin\AppData\Local\Temp\14C8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7e1dec9963f3ef50032fbe0d2b140611.exe 7B0CA618CED82989FEDBD031A449B25F4941E998E52E3D27BA58191462023833AFB52A55A9D2B628FA57593B1F36CAE9381ED32E27F45F16FB86A75B538D261F2⤵
- Deletes itself
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51257017fe0903344d6d02f32edbd142e
SHA13032cee4e2b417487e13e80c6841ea9fb014ff84
SHA2564bf245b1bc336fa0e290b2aed79079f628a26df5ee5c0c20a46b784b1a3a9ff2
SHA512453c52ea27adf2e3e557fb51e07ed9df181f9ae0b78b4afee779d43b5e55c5cdcc358fa98c73fdf709dee75a9657ccea851c4f567308eac4abc089e80b0e592b