Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
a3b9b8af4561398e7312d824bfcb499d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3b9b8af4561398e7312d824bfcb499d.exe
Resource
win10v2004-20240221-en
General
-
Target
a3b9b8af4561398e7312d824bfcb499d.exe
-
Size
1.9MB
-
MD5
a3b9b8af4561398e7312d824bfcb499d
-
SHA1
0cf300f35120c25b99ba8fc39a3069505619cb38
-
SHA256
385672ff55d9235bbe8a1eafb78209256a4335c90a2e9f0b8cb22bf15d268b7d
-
SHA512
ca3a5cd5acf81643c37073740d5bf1d15b3c4316dbe330b78ddcef4a6d44273b2a96de54b00af4eb01cdd5ab684887becee417e3959bb4111d2c58b99cd92553
-
SSDEEP
49152:Qoa1taC070dn78kX+70GhJLs6XKoFeQiVHlTo:Qoa1taC0+8R70Gh+6XAQiVFE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2492 3F03.tmp -
Executes dropped EXE 1 IoCs
pid Process 2492 3F03.tmp -
Loads dropped DLL 1 IoCs
pid Process 2372 a3b9b8af4561398e7312d824bfcb499d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2492 2372 a3b9b8af4561398e7312d824bfcb499d.exe 28 PID 2372 wrote to memory of 2492 2372 a3b9b8af4561398e7312d824bfcb499d.exe 28 PID 2372 wrote to memory of 2492 2372 a3b9b8af4561398e7312d824bfcb499d.exe 28 PID 2372 wrote to memory of 2492 2372 a3b9b8af4561398e7312d824bfcb499d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b9b8af4561398e7312d824bfcb499d.exe"C:\Users\Admin\AppData\Local\Temp\a3b9b8af4561398e7312d824bfcb499d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a3b9b8af4561398e7312d824bfcb499d.exe A5330E8EED9B00D33A728FD1433A6C68EF42A648434FC6347D5BF4A1BBF1E7FE8D02ED70D87B9949F635099FB4EDDF8345A4B536D5BF031328443B6DCDD1287F2⤵
- Deletes itself
- Executes dropped EXE
PID:2492
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ea08e1b30d0f60bfdc40b11cfa41587b
SHA10decdde2c0e44d58a53efc672a207645e5fc7fb1
SHA256446dcf9e5d925d87ecd99f13787e7f2294b6e0b7048f4f74540d2e9786d6acee
SHA512e90037b8365d8ecb1861e765ecf44d3e5aeffd7f28b1d0849a82647ce43cedfc4d51592e2980a6cd830c6de8bebad4447b368b94315626647caf89e908ca7df1