Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
9afe77f032ee59840c941feeb3a5cf60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9afe77f032ee59840c941feeb3a5cf60.exe
Resource
win10v2004-20231215-en
General
-
Target
9afe77f032ee59840c941feeb3a5cf60.exe
-
Size
1.9MB
-
MD5
9afe77f032ee59840c941feeb3a5cf60
-
SHA1
3bf8a4dfa0287332833492081676e412a89a762b
-
SHA256
c25314e65e6b0b7a8bfd8c9b2f42dc60e0b1954ffe8317e2a1374528a149b9ec
-
SHA512
d38de56ecbe1b84e85bfb44075ad307569e3af6b1e940cb16199b10df937e2e4d32bf991b5a0d7133be649c353600e3c0aef8178901cd6dd345b58cc690184be
-
SSDEEP
49152:Qoa1taC070dWySuNfyWeKnl1S4hdnVrXFBY:Qoa1taC0PkyDKnl1S4zVrXnY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 1738.tmp -
Executes dropped EXE 1 IoCs
pid Process 2396 1738.tmp -
Loads dropped DLL 1 IoCs
pid Process 2916 9afe77f032ee59840c941feeb3a5cf60.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2396 2916 9afe77f032ee59840c941feeb3a5cf60.exe 28 PID 2916 wrote to memory of 2396 2916 9afe77f032ee59840c941feeb3a5cf60.exe 28 PID 2916 wrote to memory of 2396 2916 9afe77f032ee59840c941feeb3a5cf60.exe 28 PID 2916 wrote to memory of 2396 2916 9afe77f032ee59840c941feeb3a5cf60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9afe77f032ee59840c941feeb3a5cf60.exe"C:\Users\Admin\AppData\Local\Temp\9afe77f032ee59840c941feeb3a5cf60.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\1738.tmp"C:\Users\Admin\AppData\Local\Temp\1738.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9afe77f032ee59840c941feeb3a5cf60.exe 66FBAD06C5A1C5A25B222159078205ABD29F683C610D5C8919C97E10A4AF0197BBA9D2C1B26C407455CBD75C9A222D4C12E5904851B3C313F098C5A2C4985EA22⤵
- Deletes itself
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59c3f29d8a41a3e8632b78501c3a12450
SHA160fba44d1fd94d374850a19ae9526c0982cfecdf
SHA2568d006cb8b075ed12524c6bda3a7e6914111bdb7bb6e86e8917c6eca9a2c81b48
SHA5127ffe3f54871319afd8f2304735e03e8f18049bfbedb194b01280a093793bb7b1c31cb579e69ad7ecd7f683875527912f9d346fa51d315b2b0d3ad69b3e3ab795