Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
7e8d59557d93084c01bb8ec8fb736935.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e8d59557d93084c01bb8ec8fb736935.exe
Resource
win10v2004-20231215-en
General
-
Target
7e8d59557d93084c01bb8ec8fb736935.exe
-
Size
17.9MB
-
MD5
7e8d59557d93084c01bb8ec8fb736935
-
SHA1
312970277268d0b97193ab49c61ee87fb5db95b6
-
SHA256
a27d93b987704472c46f241847f8b8bf8941466c75aec7949ada76693c1c97c6
-
SHA512
8ad165289448af65238f37c7adcfbb620e0e3385a4cff7fb52b4d85a859d3bed2ade5cfd3c62151a74e104fb0d57d257af7c0997d6e3d194cc019e4ac4d68048
-
SSDEEP
393216:8akOcaLL/V1go5kVl5AP21nwcoYTQFFAoKTH1lvhYIp3zeKNopzljVlo37xvfK:LLL/V/A5R3oYTjoKbhYEnNop6LNK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 7e8d59557d93084c01bb8ec8fb736935.tmp -
Loads dropped DLL 2 IoCs
pid Process 1440 7e8d59557d93084c01bb8ec8fb736935.tmp 1440 7e8d59557d93084c01bb8ec8fb736935.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1440 4832 7e8d59557d93084c01bb8ec8fb736935.exe 84 PID 4832 wrote to memory of 1440 4832 7e8d59557d93084c01bb8ec8fb736935.exe 84 PID 4832 wrote to memory of 1440 4832 7e8d59557d93084c01bb8ec8fb736935.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe"C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\is-TBN58.tmp\7e8d59557d93084c01bb8ec8fb736935.tmp"C:\Users\Admin\AppData\Local\Temp\is-TBN58.tmp\7e8d59557d93084c01bb8ec8fb736935.tmp" /SL5="$4021A,18308710,133120,C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
Filesize
1.1MB
MD5f334d65927f7ec93a41c4eabef84c322
SHA143c18ef3bc46e778132cb3d09f63cc98338db08b
SHA25621dbcea63205edb3ae9ff4b99ee6f9266994d2305d0b9234b59f243340e01558
SHA51256111f5630ac1cf713fa0c91343a1c3c009e1261cf180d3f1e0d4885c51163f4302b9486464e478c3ede0559bfb520601479555ce59a91d9213b8dcef0e94a5f