Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 16:02

General

  • Target

    a23a211b7d68d8a77c14e60386ef4a64.exe

  • Size

    84KB

  • MD5

    a23a211b7d68d8a77c14e60386ef4a64

  • SHA1

    fd3697d042266336b66340a347bb90791a420e07

  • SHA256

    7cde679fa9090a07792387b83ba843d9377671f78e86bffa7e0bd1c37b087837

  • SHA512

    4a34c7baed91c92429bd485ca5e076d6aa742b42bd638eefa281ce879adb11906b288a6a396e503fe8d42a1b55c77c99142229b0d8aede1e53529486ce83be17

  • SSDEEP

    1536:smNCwjzsOT/oy98kES4bhU1W+TS0RvbEVdY6viqWejgnHPMs4iQ8:s8Dd9FEblf+PRvbsY6vhAGiL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
    "C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
      C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe

    Filesize

    84KB

    MD5

    d0c1043204d93d813183802d2631c4d3

    SHA1

    f9be2d7e72e6fec281137898a32a5c43a9c88a34

    SHA256

    803401373542316d7489ee595c67040780e582b5d98b05e478ac9f099aeb8045

    SHA512

    38e4258fa893e98548f7256a395887013510717754aea93c555917c3836f051a1d5869cfff0192bcf8d223e71587e27c38544cfd401905d401b71bd10bd57aca

  • memory/2032-17-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2032-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2032-28-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB

  • memory/2180-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2180-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-4-0x00000000002E0000-0x000000000030F000-memory.dmp

    Filesize

    188KB

  • memory/2180-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-12-0x0000000000310000-0x000000000033F000-memory.dmp

    Filesize

    188KB