Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
aa13ee4ccd138df525010ff2160a1967.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa13ee4ccd138df525010ff2160a1967.exe
Resource
win10v2004-20240226-en
General
-
Target
aa13ee4ccd138df525010ff2160a1967.exe
-
Size
1.9MB
-
MD5
aa13ee4ccd138df525010ff2160a1967
-
SHA1
00fb2c14ad60c4a63ae17137a00b79232623caf7
-
SHA256
89d04be5ad9768de59862528505422e3fe543c5eff1cdeb164fad20ecc472820
-
SHA512
f164fa1d62e9a81cb99ee4b2153e375292705476602377046b0ae4ea2f316e02e7102bf52029d42b21a32a7c1a33e9cbc69355fdac8591391461654e34a92459
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dArRb4GwVk8O+UxDAHG3La/RNKCWcdFpF4kr7:Qoa1taC070dcaVRWxDp36OCbdLWGV1km
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 255C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2020 255C.tmp -
Loads dropped DLL 1 IoCs
pid Process 112 aa13ee4ccd138df525010ff2160a1967.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 2020 112 aa13ee4ccd138df525010ff2160a1967.exe 28 PID 112 wrote to memory of 2020 112 aa13ee4ccd138df525010ff2160a1967.exe 28 PID 112 wrote to memory of 2020 112 aa13ee4ccd138df525010ff2160a1967.exe 28 PID 112 wrote to memory of 2020 112 aa13ee4ccd138df525010ff2160a1967.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa13ee4ccd138df525010ff2160a1967.exe"C:\Users\Admin\AppData\Local\Temp\aa13ee4ccd138df525010ff2160a1967.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\255C.tmp"C:\Users\Admin\AppData\Local\Temp\255C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\aa13ee4ccd138df525010ff2160a1967.exe E1E707B016CE1B1670504ED7E91FF5D86122B250FFD7CC317809F2A4B4A4203BF1F2AFC803239149A0BEF1824E934537F4287E7E2DE6EB58D33A8FEC1EBD1B742⤵
- Deletes itself
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e0ef97a5a93d1b10ec7a8f0ca2442b98
SHA12141b708b63dd94bfb0ed7383d30aa33739a8fd7
SHA256d10c6e718390d785ab7671fce5f4e0b8437e41514b1b8226e3ce4514e1579f61
SHA512bc5d1bd483adef61a8863f794ac755d4a7cabc841c364c486f28cdb463f13b5fb2d81879cb55ace6586412e07f59e8c00c6b3737a867d3aa0ba5c169d0c3b692