Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
7e814eb7a7de7d9a1f48e7f891ce9286.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e814eb7a7de7d9a1f48e7f891ce9286.exe
Resource
win10v2004-20231215-en
General
-
Target
7e814eb7a7de7d9a1f48e7f891ce9286.exe
-
Size
1.9MB
-
MD5
7e814eb7a7de7d9a1f48e7f891ce9286
-
SHA1
a0ba5fc0b0b63f6dc4e27a6f3a0f2bcdaf82f1d9
-
SHA256
4952931c280f994a7e0c5d44896663d9e6bb98437801259c8e151ccbe59a0d46
-
SHA512
88d16e2c6d171ff835db95dfd4fbd34b0ffa1f56f299fa3c7429fc63d16ca8912dd42cece5735f7e19f6e152d11d8c76b3036f1fadd3796fa49b417a8e65968e
-
SSDEEP
49152:Qoa1taC070dsXx3zpfNa31xrgUKqkwePRfb7bZ:Qoa1taC0f2ayknbZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4424 42C6.tmp -
Executes dropped EXE 1 IoCs
pid Process 4424 42C6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 832 wrote to memory of 4424 832 7e814eb7a7de7d9a1f48e7f891ce9286.exe 85 PID 832 wrote to memory of 4424 832 7e814eb7a7de7d9a1f48e7f891ce9286.exe 85 PID 832 wrote to memory of 4424 832 7e814eb7a7de7d9a1f48e7f891ce9286.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe"C:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\42C6.tmp"C:\Users\Admin\AppData\Local\Temp\42C6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7e814eb7a7de7d9a1f48e7f891ce9286.exe 6B6D77C30C6C3F394E3F734C4155D8A0C1AA50CFA45169F64CE86FDDE4DB62CDD269A219D3824B416F35977B48245E3FEEC3C9A486A1E15C539C73C0C354BF392⤵
- Deletes itself
- Executes dropped EXE
PID:4424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5321a0a90d280be35ad4bf6071d2daa40
SHA19834c9d2ac003c4b47f7369346fcd21b316ecd01
SHA25635e87b72c1d37e61e0b74dcb3083f5013b5f48b771c2119b5c87341fecad7fa3
SHA51254d70ac8f786836df11077f3e0f59a9b82bef9cf169d7d60e2e2e0c7d1309b235b2e8c445fceddf05da5073552d65bacef00ae553b1b966ff095ae891970d796