Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 19:51
Behavioral task
behavioral1
Sample
7ddaaad4da9d788389fbcaa24bf011f1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7ddaaad4da9d788389fbcaa24bf011f1.exe
Resource
win10v2004-20231215-en
General
-
Target
7ddaaad4da9d788389fbcaa24bf011f1.exe
-
Size
1.3MB
-
MD5
7ddaaad4da9d788389fbcaa24bf011f1
-
SHA1
7bd5f60b0ea683f3a238e83dbf50eb3f225a6073
-
SHA256
b1e358e09b78f7580ffcd335f2e3b0fc8368967995a6912161291eca0ec2dc3f
-
SHA512
7b96f9ab16ae04d8351c8b237e2c5c5d5e9b247a175a0d741021f4dcfc47b4c63ebd5c78813fd82ea2bebc0f0d283643b6082ddef7b8c7b5712a2b124016df64
-
SSDEEP
24576:94UPdcOpvhj73LZlKkde4AjRk39NXwfLDpD+uSbrvG:9XPbTjrLHKOe4aRk3UfvpquS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 7ddaaad4da9d788389fbcaa24bf011f1.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 7ddaaad4da9d788389fbcaa24bf011f1.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe -
resource yara_rule behavioral1/memory/2088-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000900000001447e-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe 2940 7ddaaad4da9d788389fbcaa24bf011f1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2940 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe 28 PID 2088 wrote to memory of 2940 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe 28 PID 2088 wrote to memory of 2940 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe 28 PID 2088 wrote to memory of 2940 2088 7ddaaad4da9d788389fbcaa24bf011f1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ddaaad4da9d788389fbcaa24bf011f1.exe"C:\Users\Admin\AppData\Local\Temp\7ddaaad4da9d788389fbcaa24bf011f1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\7ddaaad4da9d788389fbcaa24bf011f1.exeC:\Users\Admin\AppData\Local\Temp\7ddaaad4da9d788389fbcaa24bf011f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5007b611f5ebd39da20b9d1d040e78670
SHA1fbdedb6cb36241b3958d3366d761f155b874a718
SHA2562a05d1ad08b9bb513430c2105886792f1f7eff92fdd14114ef6c758ccf9ea33d
SHA512b8ff4db7d386285dfa092ee11a7f2e828047ac933b99e358ba953742aca6c62fdc7dbcd13c771b2b4704ca67a25b111f7b3b53beb02e4195eae4253486d785db