Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
7e814eb7a7de7d9a1f48e7f891ce9286.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e814eb7a7de7d9a1f48e7f891ce9286.exe
Resource
win10v2004-20231215-en
General
-
Target
7e814eb7a7de7d9a1f48e7f891ce9286.exe
-
Size
1.9MB
-
MD5
7e814eb7a7de7d9a1f48e7f891ce9286
-
SHA1
a0ba5fc0b0b63f6dc4e27a6f3a0f2bcdaf82f1d9
-
SHA256
4952931c280f994a7e0c5d44896663d9e6bb98437801259c8e151ccbe59a0d46
-
SHA512
88d16e2c6d171ff835db95dfd4fbd34b0ffa1f56f299fa3c7429fc63d16ca8912dd42cece5735f7e19f6e152d11d8c76b3036f1fadd3796fa49b417a8e65968e
-
SSDEEP
49152:Qoa1taC070dsXx3zpfNa31xrgUKqkwePRfb7bZ:Qoa1taC0f2ayknbZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2008 623C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2008 623C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1836 7e814eb7a7de7d9a1f48e7f891ce9286.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2008 1836 7e814eb7a7de7d9a1f48e7f891ce9286.exe 28 PID 1836 wrote to memory of 2008 1836 7e814eb7a7de7d9a1f48e7f891ce9286.exe 28 PID 1836 wrote to memory of 2008 1836 7e814eb7a7de7d9a1f48e7f891ce9286.exe 28 PID 1836 wrote to memory of 2008 1836 7e814eb7a7de7d9a1f48e7f891ce9286.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe"C:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\623C.tmp"C:\Users\Admin\AppData\Local\Temp\623C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe DC6E3F2512BBA081019FFF919488F46E5166542775C2E2AB9EF23AFE78C83E82E7D334D575487CE5D93D843D58B8040BB0317DCF6C979D018E5B3750F40BAC102⤵
- Deletes itself
- Executes dropped EXE
PID:2008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d900e7ce2f817933c6c07acfa608aa90
SHA1eb11f254ec3252caeb51d1fe54507a62c0178695
SHA256b0bd0d1247d7d1f9f0abe5198a0608c853d0e421027c205412ddea00e6229186
SHA512d2bdba9f4602d0ee8a974c3290984a45fb9df68828a995b0320fb0143357feafec0b772759907953997887285fde4f5c4e2f5477345f8701b163c3203e51784e