Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
7dcd26623bee10a9de849c4afc33b6cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7dcd26623bee10a9de849c4afc33b6cb.exe
Resource
win10v2004-20231222-en
General
-
Target
7dcd26623bee10a9de849c4afc33b6cb.exe
-
Size
82KB
-
MD5
7dcd26623bee10a9de849c4afc33b6cb
-
SHA1
e3a69d6a09fdb69953fd0b97a0753d4ef6fd8aec
-
SHA256
e083ee90b2c70a917b256a11f06b8583c951b2634a4fd7e16d82986f13e6dab7
-
SHA512
d1353f66a631969abfd7e7de2349cd5ebd62e50795a408790b07511b0f75123d3afd4102a6e5c7cfc11bdb3e36176f4b5071a5eb1f4c47a5a1084a744956e854
-
SSDEEP
1536:d9XGvQPVLQ7OjSzt5Rb20QPaI6/SjShCNApBWAJnwiD4Lw7XRK:fXGYPV0SjSJ5RitaX/Szk0AJnwUDU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 7dcd26623bee10a9de849c4afc33b6cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 7dcd26623bee10a9de849c4afc33b6cb.exe -
Loads dropped DLL 1 IoCs
pid Process 840 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 840 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 840 7dcd26623bee10a9de849c4afc33b6cb.exe 2292 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2292 840 7dcd26623bee10a9de849c4afc33b6cb.exe 29 PID 840 wrote to memory of 2292 840 7dcd26623bee10a9de849c4afc33b6cb.exe 29 PID 840 wrote to memory of 2292 840 7dcd26623bee10a9de849c4afc33b6cb.exe 29 PID 840 wrote to memory of 2292 840 7dcd26623bee10a9de849c4afc33b6cb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe"C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exeC:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d57066ad39c583e9f2b0def42ccfad28
SHA18eb9640a9252d8344f557ea979219838d4d169a8
SHA256c114482b583c70b79d38d8e738193c1fc407ea385abc4c0aac991aa800003d61
SHA5122e98092bda4408517c03b3a12d008b80beb999b426c2d140c1e67df7ba2c084fb4a21e4588dd1607951d4daef6d26c8880414fcb28cc16b16dc2e0889754e4c4