Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
7f8983de7aaa0dc9f1e5781af61331cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f8983de7aaa0dc9f1e5781af61331cd.exe
Resource
win10v2004-20231215-en
General
-
Target
7f8983de7aaa0dc9f1e5781af61331cd.exe
-
Size
105KB
-
MD5
7f8983de7aaa0dc9f1e5781af61331cd
-
SHA1
2ee2b0720c11e919cd66eb7db78de3721bf608a8
-
SHA256
ab16140a9c9de8dec3bc36cf0bb7b28847f8f6a15bf229231245f1c0b64eec2c
-
SHA512
031ff4391f5b65a19f2499ba8296744fc89f4752c21b15cbbeeab60371e2e7234abc381e0e00275625615f43680042cd4f2eb7bd00c81812c7ba48b2fc7d134b
-
SSDEEP
3072:ToIxvIG98kc6OdwGEnqrO8voEIMxtRdj9RApW9i:MGIG9U66wGEn6O8vRtD9RAY4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1284 7f8983de7aaa0dc9f1e5781af61331cd.exe -
Executes dropped EXE 1 IoCs
pid Process 1284 7f8983de7aaa0dc9f1e5781af61331cd.exe -
Loads dropped DLL 1 IoCs
pid Process 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe 1284 7f8983de7aaa0dc9f1e5781af61331cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1284 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe 29 PID 1308 wrote to memory of 1284 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe 29 PID 1308 wrote to memory of 1284 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe 29 PID 1308 wrote to memory of 1284 1308 7f8983de7aaa0dc9f1e5781af61331cd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8983de7aaa0dc9f1e5781af61331cd.exe"C:\Users\Admin\AppData\Local\Temp\7f8983de7aaa0dc9f1e5781af61331cd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7f8983de7aaa0dc9f1e5781af61331cd.exeC:\Users\Admin\AppData\Local\Temp\7f8983de7aaa0dc9f1e5781af61331cd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD579e2b3315025a81908727187c4a7a575
SHA1f587c3ecbdab434affad869cad367f93632f5b51
SHA2568a19d7a7f867089582801390dc6c24e6d7d330e341a45fc106243615a6b6fc82
SHA512811a3ddf5a4a25011e924cf205ee21420a1ca800a398cf2e38817db5571b6a2fbd5c8be662bac005942bd3083a11b92ffc6c7fe141f854320922997fb40dc137