Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 18:23
Behavioral task
behavioral1
Sample
7daf03acfd8405577ea3654d2863dffc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7daf03acfd8405577ea3654d2863dffc.exe
Resource
win10v2004-20231215-en
General
-
Target
7daf03acfd8405577ea3654d2863dffc.exe
-
Size
1.3MB
-
MD5
7daf03acfd8405577ea3654d2863dffc
-
SHA1
3356445cfbff9a9b175124a8ccf773b28676fa67
-
SHA256
1f9cdbca381754a0e655c0aa23b7132f98f4aa9caec239beed1b2664487c23bd
-
SHA512
b75c82c42ac4c8cb3bb5b570a8b9f0cce67230d1d64e1a72c853f977504c1f42f1d06f57987adeddfbc6483c3474acf349cb74591ccbb8902bed6ef8768e7147
-
SSDEEP
24576:5HXmsF773lPNBs1vi+pOsHVFNiGRqZOMTefh8ugZsbUHWO:hWYRNBs1KWhkwYT4g+Ef
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 7daf03acfd8405577ea3654d2863dffc.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 7daf03acfd8405577ea3654d2863dffc.exe -
Loads dropped DLL 1 IoCs
pid Process 1616 7daf03acfd8405577ea3654d2863dffc.exe -
resource yara_rule behavioral1/memory/1616-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x00070000000120ff-10.dat upx behavioral1/files/0x00070000000120ff-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 7daf03acfd8405577ea3654d2863dffc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1616 7daf03acfd8405577ea3654d2863dffc.exe 2052 7daf03acfd8405577ea3654d2863dffc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2052 1616 7daf03acfd8405577ea3654d2863dffc.exe 28 PID 1616 wrote to memory of 2052 1616 7daf03acfd8405577ea3654d2863dffc.exe 28 PID 1616 wrote to memory of 2052 1616 7daf03acfd8405577ea3654d2863dffc.exe 28 PID 1616 wrote to memory of 2052 1616 7daf03acfd8405577ea3654d2863dffc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7daf03acfd8405577ea3654d2863dffc.exe"C:\Users\Admin\AppData\Local\Temp\7daf03acfd8405577ea3654d2863dffc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\7daf03acfd8405577ea3654d2863dffc.exeC:\Users\Admin\AppData\Local\Temp\7daf03acfd8405577ea3654d2863dffc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD5b4fc546524ab092663bda918a25625a4
SHA17787bbdf38c076dc0dcb3a22444afe160109d5bb
SHA256f35e5b4ab120a2da5f2fc023215d7ada153a761c8344ee8153114db1ae70734d
SHA51284741b44b6e79cd278c922fc2394746745fae2bd1acf9846ab5989f0f4b73d93daf879afd5057e6252e5978d6886c144fc8d641061e93c73c8551dc09023c9b6
-
Filesize
603KB
MD5b258bfab6f798addf80de97751de9ffc
SHA1bb69cf0deeae07e72d584419f9b2f1276a1ddaec
SHA25652e965ee5dfa9b60f4c3a6239221fcd41af8124ec9f0ad53a782fcd5ce0151c3
SHA51248e9214d82ff0e96f204dfe1f13fb69fed14eaee7a5353353a17ff6f6d550a3626c3deaec48503eaea5c1a31892264c96096d6dd162abe03b23817ff61639450