Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
8e8b6e29535871b9b9331912d1772ee2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e8b6e29535871b9b9331912d1772ee2.exe
Resource
win10v2004-20231215-en
General
-
Target
8e8b6e29535871b9b9331912d1772ee2.exe
-
Size
1.9MB
-
MD5
8e8b6e29535871b9b9331912d1772ee2
-
SHA1
f5df1086c6644a54ee3a8e0b73c2d835da931bb4
-
SHA256
e1c68ada25ce27178572debca11efb387bfabb3fd59f3f52bc325f5b969938bd
-
SHA512
a29a2b59227bfcfe96cd5b83db06e2723efb9d29a0ae86917b5b02f862223da3cd8564c40629a691610336780616be09b0273301b279701b2b6d4696114d6ff3
-
SSDEEP
49152:Qoa1taC070dg7QRzxp68RMNgbdyMKg0kH:Qoa1taC0ZonmZgL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 4BDF.tmp -
Executes dropped EXE 1 IoCs
pid Process 2788 4BDF.tmp -
Loads dropped DLL 1 IoCs
pid Process 2416 8e8b6e29535871b9b9331912d1772ee2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2788 2416 8e8b6e29535871b9b9331912d1772ee2.exe 28 PID 2416 wrote to memory of 2788 2416 8e8b6e29535871b9b9331912d1772ee2.exe 28 PID 2416 wrote to memory of 2788 2416 8e8b6e29535871b9b9331912d1772ee2.exe 28 PID 2416 wrote to memory of 2788 2416 8e8b6e29535871b9b9331912d1772ee2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe"C:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"C:\Users\Admin\AppData\Local\Temp\4BDF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8e8b6e29535871b9b9331912d1772ee2.exe 4978F9ED5D0974FF4DE81548CDA943D624F1026F27381F2FBE2C20603F478522EDC4685477B30B6E0C3A54CD99160AEE5F58FA571F5C0CDE7023F9C06DA195722⤵
- Deletes itself
- Executes dropped EXE
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5994f21519c9f6cf2f7ab99c1b9b87de6
SHA1edfbfcf8328292d4ebed05bb7058bcea664f923d
SHA2568732bf7863bb962d56976feddad3a8bcd87d70d15e52f4b2970c79348df72ab1
SHA5129a321b3a449acdb1ad785e9aff07f562b798b06e19b6ff626fe4494eea6734f819d622c9aae3e581c9f82aadb332236423a9acf7fa33a9769a468e8ae674f11f