Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
b916dbf4c1ab40b6def075bfcb123fa5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b916dbf4c1ab40b6def075bfcb123fa5.exe
Resource
win10v2004-20231215-en
General
-
Target
b916dbf4c1ab40b6def075bfcb123fa5.exe
-
Size
428KB
-
MD5
b916dbf4c1ab40b6def075bfcb123fa5
-
SHA1
61ce12d729e8a30f0155c61209d8633182d9164c
-
SHA256
4d764f4a9aeeb974560d0fe4b5c91564b3ed3d4931697bc8061211c2da7434d3
-
SHA512
50aa49c563a0e97b219f6f141a2d0b6facd33df993165b734b5e1e8c79829fb532a4de2b002cc13761a223591c1ca86aede0139456da495188a10f4ee814b923
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFV9IR19BtpcQ+JAewV4GdhyTh+W5PyqHR:gZLolhNVyE89o9NcQzewCEC+WwqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 1333.tmp -
Executes dropped EXE 1 IoCs
pid Process 2020 1333.tmp -
Loads dropped DLL 1 IoCs
pid Process 2668 b916dbf4c1ab40b6def075bfcb123fa5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2020 2668 b916dbf4c1ab40b6def075bfcb123fa5.exe 28 PID 2668 wrote to memory of 2020 2668 b916dbf4c1ab40b6def075bfcb123fa5.exe 28 PID 2668 wrote to memory of 2020 2668 b916dbf4c1ab40b6def075bfcb123fa5.exe 28 PID 2668 wrote to memory of 2020 2668 b916dbf4c1ab40b6def075bfcb123fa5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b916dbf4c1ab40b6def075bfcb123fa5.exe"C:\Users\Admin\AppData\Local\Temp\b916dbf4c1ab40b6def075bfcb123fa5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\1333.tmp"C:\Users\Admin\AppData\Local\Temp\1333.tmp" --pingC:\Users\Admin\AppData\Local\Temp\b916dbf4c1ab40b6def075bfcb123fa5.exe AA2DDFBD0E39DF65700DE12E1BF428D45D7EA9C38572C6348E7549D7E0645F2CDD974458E2F7303DCB2C2FA57DAE13FFD18F99B60C68F5545A925BAC246F71052⤵
- Deletes itself
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5cfc45e4824237ed3fc272a5fd0ff7412
SHA1dae451ac6a4da80d89741f1d5fa658a853e135d3
SHA256b0b1fc776f645f9894231141110cb715d3fe1b3e96b41cd6dfab0d554c00a967
SHA5123893e44fbc004bfaa320fba867e01a831a2cf6c81b070fe38933621b07875703fad95f9766796110fe8f56de2f64448a5ea27ad3a9e7c4d0f2ee9651d021eb6c