Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 11:47

General

  • Target

    99580b3301bdb169cf89486107fbb019.exe

  • Size

    82KB

  • MD5

    99580b3301bdb169cf89486107fbb019

  • SHA1

    59605f4d31331e78585294fdfec22a8435d86423

  • SHA256

    12a2e7e4cadf81cc5dc13d045adb6de06d08e8b4b4adb5cd68b1368be92f0c4e

  • SHA512

    21d12be39aa66314584c77b7eff91fd258f4f842d1f5b182c361270a61ce598d9e1d6b501b3becf41a9eb2c3b8722fe13dba7db5f98a06d0979a3a035455bac7

  • SSDEEP

    1536:IPcFDdvTUPigetmBUS9ifRoL9lsWaXP8rqrefLeIBFA3VGKGVR:gyTUPFnxI0gP82eaIBFA3eR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe
    "C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe
      C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe

    Filesize

    82KB

    MD5

    d53c843badb4e3f365b94ab49371d821

    SHA1

    ff4801fcef491d22af3df87f638be6b00cf42645

    SHA256

    837e81766d7b442ad586828e59489dc606e53480c3af84b555e48af77b4fc6bc

    SHA512

    342bbc7ea7a03feab012028ccaed033d3ff86d76a3e3a0c3063c9e6b6a6e84365c058f8185ef9fe4e5864f056fa5ed5330d47df5e2edcd9e74441ecf9aeb5036

  • memory/2384-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2384-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2384-1-0x0000000000170000-0x000000000019F000-memory.dmp

    Filesize

    188KB

  • memory/2384-16-0x0000000000320000-0x000000000034F000-memory.dmp

    Filesize

    188KB

  • memory/2384-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3056-18-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3056-20-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/3056-24-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3056-27-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB