Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
8e6211534a7dbb18d840bdd4a1203a5d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e6211534a7dbb18d840bdd4a1203a5d.exe
Resource
win10v2004-20231215-en
General
-
Target
8e6211534a7dbb18d840bdd4a1203a5d.exe
-
Size
15.4MB
-
MD5
8e6211534a7dbb18d840bdd4a1203a5d
-
SHA1
e6607b811dd9d402a1c9e1da7c85e26ebd0d7cf6
-
SHA256
c7433bd25fe3a9df75f813657b08ece8a8a9b4f26243d44242250bf08882bd85
-
SHA512
fa2203192273d58b246acbb802435cc10bb8cb224b999896136687295318429a6220e6c5b013b3119b786bf0b7f789481de06a5ad85916ab89bc87bf81dc610a
-
SSDEEP
393216:S4OpwRA9HEpijHov7EGhvzF1uzzZF6c7MEc15b1SQ4AyP:nRzpWHUA41SQJEmbNdyP
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2216 8e6211534a7dbb18d840bdd4a1203a5d.tmp -
Loads dropped DLL 2 IoCs
pid Process 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 2216 8e6211534a7dbb18d840bdd4a1203a5d.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 8e6211534a7dbb18d840bdd4a1203a5d.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28 PID 1936 wrote to memory of 2216 1936 8e6211534a7dbb18d840bdd4a1203a5d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6211534a7dbb18d840bdd4a1203a5d.exe"C:\Users\Admin\AppData\Local\Temp\8e6211534a7dbb18d840bdd4a1203a5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\is-OJBJV.tmp\8e6211534a7dbb18d840bdd4a1203a5d.tmp"C:\Users\Admin\AppData\Local\Temp\is-OJBJV.tmp\8e6211534a7dbb18d840bdd4a1203a5d.tmp" /SL5="$400E4,15605223,119808,C:\Users\Admin\AppData\Local\Temp\8e6211534a7dbb18d840bdd4a1203a5d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d5d303dbabe599c5b4c9b96571d1b599
SHA1265641e6144297bfe761ca3b332349e0d0b7a5b5
SHA256e277bc4cc95eec3a3b1341270f62c12adcf2c6ed666f59f611219e4193d1fe44
SHA512de44eac295721c07c789a1c5862e1522a0c0a73d0a0e6d016de60672fab447e7eae5b7b5ad9ae2be2cadf1d9559cdadc6bd2367a195172305085ab1bc2c683be
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df