Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 03:25

General

  • Target

    1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.exe

  • Size

    23.6MB

  • MD5

    676c5efe2dd5efd736d177950899013c

  • SHA1

    c7e29bc0f7a209bdadf96911e88a31e05e6f3280

  • SHA256

    1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a

  • SHA512

    94a73545692eee7fba9d1177ec4a6eae6a8fa9670d461ed99c965eaa8a81ce9538a29cfc56bf4575eee00831e47661e777de92897ec815fb7f7cee8213b9dff1

  • SSDEEP

    393216:xbbmHFpFgyHkLQFWaTj5++V3RWSbK2UDAV7QedEoe/LzO/qfo/GwgwaenAgw3of:xuHFpf5FUw3RWr2UUIX/LCywuwseANG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.exe
    "C:\Users\Admin\AppData\Local\Temp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\is-K2UEH.tmp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-K2UEH.tmp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.tmp" /SL5="$400EE,23761289,788480,C:\Users\Admin\AppData\Local\Temp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-K2UEH.tmp\1561edfef7a4549466f790bc4cf86c1ff1cb74604621e63388674ab1ed94e09a.tmp

    Filesize

    2.9MB

    MD5

    e5c83fa37a5691f28fdba82cd48971bc

    SHA1

    fd4377f87405a70e1bc28020e8029564d9fe54b5

    SHA256

    fa8b5186285e842910350f478366e0e28386c4aa762d8869e1e32282fd9dd5e9

    SHA512

    138d46e77f2f322527764a424b052586255330076808fd649e4d501b701cf455405e0b3913d3ca6b71d5e5f67f3599b6640cdb73ae90997eee3baed64ed3686e

  • memory/2080-1-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2080-10-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2952-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2952-11-0x0000000000400000-0x00000000006F0000-memory.dmp

    Filesize

    2.9MB

  • memory/2952-14-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB