Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 05:59
Behavioral task
behavioral1
Sample
7f111792e6702df40a5ab53733e29f9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f111792e6702df40a5ab53733e29f9d.exe
Resource
win10v2004-20231215-en
General
-
Target
7f111792e6702df40a5ab53733e29f9d.exe
-
Size
5.3MB
-
MD5
7f111792e6702df40a5ab53733e29f9d
-
SHA1
064ce9579db2fa79b0d305db2886a6493af7cbda
-
SHA256
1489b23bbd6c625178619170c1d4e7872a9dffd0806a5974977cb6bfb6e98439
-
SHA512
aec8f1bb02a426e86507a9652cd72e70ca3bb0d90b02ee1cbd195ab5fd1c89ea9ece08596cdd286727a417b9b1382bcfc5317c46d86823553b5d759788606c45
-
SSDEEP
98304:Fyt8aNskNMcbQ0m4hl+ev8UFp0nghhuPe/6m01k8l+ev8UFp0:FyHlNHba4TH8USgnT6m01zH8U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2412 7f111792e6702df40a5ab53733e29f9d.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 7f111792e6702df40a5ab53733e29f9d.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 7f111792e6702df40a5ab53733e29f9d.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c000000012327-14.dat upx behavioral1/files/0x000c000000012327-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 7f111792e6702df40a5ab53733e29f9d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 7f111792e6702df40a5ab53733e29f9d.exe 2412 7f111792e6702df40a5ab53733e29f9d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2412 1992 7f111792e6702df40a5ab53733e29f9d.exe 28 PID 1992 wrote to memory of 2412 1992 7f111792e6702df40a5ab53733e29f9d.exe 28 PID 1992 wrote to memory of 2412 1992 7f111792e6702df40a5ab53733e29f9d.exe 28 PID 1992 wrote to memory of 2412 1992 7f111792e6702df40a5ab53733e29f9d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe"C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exeC:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624KB
MD5548ba1e20e5f3334ea26a490e39175a9
SHA11e7ba30721749acf58949f38b4c22954edb9a844
SHA256388e35c525d88b86ec26a2bf6a858b08b50b3cc361281698914323b2dc6a7ce0
SHA5121187ce389ffa02de7e9ac75a6bf13e5251f18bc648bd08c2c5ed0b742e70a9e906298cb7a5ef9b1ad3c1628b76320776d89191887e37df59e37008f5d1d279aa
-
Filesize
955KB
MD5031c87c7ff832bd043e55d85937183c0
SHA183df0024c9366862605633896534bf7781f67515
SHA2560b52b167fec03fe49f2a1da6839f6dfa6b4f38c857b3ed3012c427a04260c9e3
SHA512360341c0179faba1405d216fc3945fc91885799f63accd632852051ac5108100f9778d4baaf2cb02ee93b52f0a6077bb25be5d29548e669120ed5af8790a6036