Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
a35ec8925cb86167919edd85aaae753e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a35ec8925cb86167919edd85aaae753e.exe
Resource
win10v2004-20240221-en
General
-
Target
a35ec8925cb86167919edd85aaae753e.exe
-
Size
1.9MB
-
MD5
a35ec8925cb86167919edd85aaae753e
-
SHA1
8413fd53f0e2106e486da355a540248db1bce4d3
-
SHA256
be27d0650ebf7d1077c35b850f8bf75af806a9a74e06a946a6f321179e0d382c
-
SHA512
87459c4f6a4a869d44542733c534482de074b9d9992739494764584ed2e655c8f698edd3276e19184edfedd070c1d725c81fc79aee27175086dff888c4327cfb
-
SSDEEP
49152:Qoa1taC070dm7wU7IQF7wPxv49kAWWo0Z:Qoa1taC0IUUQtKvqvW+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 F5C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2300 F5C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2240 a35ec8925cb86167919edd85aaae753e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2300 2240 a35ec8925cb86167919edd85aaae753e.exe 28 PID 2240 wrote to memory of 2300 2240 a35ec8925cb86167919edd85aaae753e.exe 28 PID 2240 wrote to memory of 2300 2240 a35ec8925cb86167919edd85aaae753e.exe 28 PID 2240 wrote to memory of 2300 2240 a35ec8925cb86167919edd85aaae753e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35ec8925cb86167919edd85aaae753e.exe"C:\Users\Admin\AppData\Local\Temp\a35ec8925cb86167919edd85aaae753e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\F5C.tmp"C:\Users\Admin\AppData\Local\Temp\F5C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a35ec8925cb86167919edd85aaae753e.exe EAC5FE9F281FD24BA1F8E938B011D3AB48B895DCF51B2F48EA661F3B3C22E6687AB9FDFEB75179FFCB2D891EA7FF2F1CEC667C6F717C9B3259AB12C98FDF4FE62⤵
- Deletes itself
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD52c6fef32c0e73a0147c659e6467b019d
SHA13e9b89a65c21c20e5ba549ad0f5d7c134abfc668
SHA2561fb92ca7083448d1da575c5779ae0c321325f089072cc6367ee386a51d894984
SHA512178f04f8031c142916f393b078931326a1149b914eb83a278d3d134a6823a9711a2aeeac2c99f5570ae5d2e9e62bffd08d06745bd31cf997a1ef1fe6079597d5