Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
7eea060d6ef339f349f3df90dd7da07f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7eea060d6ef339f349f3df90dd7da07f.exe
Resource
win10v2004-20231222-en
General
-
Target
7eea060d6ef339f349f3df90dd7da07f.exe
-
Size
84KB
-
MD5
7eea060d6ef339f349f3df90dd7da07f
-
SHA1
ce5bfc0cc35b648bbf57f3f7d02d64ca77ad9cb6
-
SHA256
477f1ece0eed3d28b1fdd96ff313b512ef1ab138d3539d8bd770cd9841a27e1b
-
SHA512
0eefcc3626297699955c07af6014e9850211481a5f129c63d16f27eb130fbe720e73dcdc384e90a219dc86e484c113bc60959c40c9d8d8842aa39e4261fece99
-
SSDEEP
1536:AQyhAptXSe01i1TuhX9AiGWo8+io1n5hwCFGZqoaUHOCK0L/L9pZs5r:yhArV01ioME5oRPFbolhLxsF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2080 7eea060d6ef339f349f3df90dd7da07f.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 7eea060d6ef339f349f3df90dd7da07f.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 7eea060d6ef339f349f3df90dd7da07f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2232 7eea060d6ef339f349f3df90dd7da07f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 7eea060d6ef339f349f3df90dd7da07f.exe 2080 7eea060d6ef339f349f3df90dd7da07f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2080 2232 7eea060d6ef339f349f3df90dd7da07f.exe 20 PID 2232 wrote to memory of 2080 2232 7eea060d6ef339f349f3df90dd7da07f.exe 20 PID 2232 wrote to memory of 2080 2232 7eea060d6ef339f349f3df90dd7da07f.exe 20 PID 2232 wrote to memory of 2080 2232 7eea060d6ef339f349f3df90dd7da07f.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eea060d6ef339f349f3df90dd7da07f.exe"C:\Users\Admin\AppData\Local\Temp\7eea060d6ef339f349f3df90dd7da07f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\7eea060d6ef339f349f3df90dd7da07f.exeC:\Users\Admin\AppData\Local\Temp\7eea060d6ef339f349f3df90dd7da07f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD53368ffe2e04c2b84bd83b8c544b5fe3a
SHA17f4473305d516a0da3831eee003c4c1d9950ebfa
SHA2562ba02eec312e8c31f56793d556a2407b260fd7fe1e10b9d2348fa85567c4d773
SHA5129ae237c31c1ebbf13675b8c10e0e3c308d2573b791f2fe402a60e02e2c972de32a8a7b09eb1827eb2c7353639308193b71414216002845180a1793faeeb07791