Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
7ecf5cc692e86b466ded5d780f91ef26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ecf5cc692e86b466ded5d780f91ef26.exe
Resource
win10v2004-20231222-en
General
-
Target
7ecf5cc692e86b466ded5d780f91ef26.exe
-
Size
504KB
-
MD5
7ecf5cc692e86b466ded5d780f91ef26
-
SHA1
8ecd1de2b853e1b84d3d11aba71e59cb472e99b2
-
SHA256
15819e629f6a29a3bdeed29bc43b1907ae2df8f56aff6bcfac4c26ebcaac4d36
-
SHA512
6c2b9785abe243cb227acfdc0b97cdadbfaec7ad22a00713d09b68ffd29ee8e4eb424ca11d74d0b3e2a6582d9739b3e1f6e690366c98f38473e70abbc9408399
-
SSDEEP
12288:SSxG05888888888888W88888888888/4khP50GG7/uuzggp6NMWfpRoNtqJPBI:ZxGY70G6BzzwNMWPPG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 632 7ecf5cc692e86b466ded5d780f91ef26.tmp -
Loads dropped DLL 1 IoCs
pid Process 632 7ecf5cc692e86b466ded5d780f91ef26.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 632 2688 7ecf5cc692e86b466ded5d780f91ef26.exe 87 PID 2688 wrote to memory of 632 2688 7ecf5cc692e86b466ded5d780f91ef26.exe 87 PID 2688 wrote to memory of 632 2688 7ecf5cc692e86b466ded5d780f91ef26.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\is-IG6CL.tmp\7ecf5cc692e86b466ded5d780f91ef26.tmp"C:\Users\Admin\AppData\Local\Temp\is-IG6CL.tmp\7ecf5cc692e86b466ded5d780f91ef26.tmp" /SL5="$A0068,127487,119296,C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD52ea92b11633afadba96648666b9df024
SHA125cae5012a8fe86c34e5918613be3fc4e7480fbd
SHA256ad04e5eeec0ed157c4c6c5a1b919746e04d6270a15d8d6fb192bbc566d2fd3d7
SHA512dd85de944271aa333d9eac175bd2167c5cb8771ece679af888a96e340dd5f1728ad3e3f9209546f5e17f22e91a9659e7168e12a7935ab4820e135a9f1f534471
-
Filesize
1.1MB
MD52d78e44dbc0cdb8ae0e21cc412201b64
SHA109408ff5509b355c770e96851d0bffc0282ab6e9
SHA2568fd3d81ee6ea46517268756dbd128946d6249a962357e7108213955af5c6f2a0
SHA51242300e7c38ec574e604da94c54c0a0358705e7b5340c00c92a846bebde4b418c01e01bba65af35f427f7fedd3a1ea4dd56ac7535a73314610df19a8fea57524b
-
Filesize
569KB
MD5cb41216d7dca98873939ae150c9e03c2
SHA1f5e0cdef0eba718989353a2245e64e58badecf5d
SHA256cd9477686499d6a05bec33c01160f01403fc25391aef295a540acb7b4d12023b
SHA5126405b70586b2c581e98a6d56e8f32fa63b899c54508c809a2bf0408a5202bdcd645044c2360e9beb8c9b6e94d721ef522d04a54746ad4718a150ff053a96611a