Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
add6ad343a096b29fa9c3dafb053336d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
add6ad343a096b29fa9c3dafb053336d.exe
Resource
win10v2004-20240226-en
General
-
Target
add6ad343a096b29fa9c3dafb053336d.exe
-
Size
82KB
-
MD5
add6ad343a096b29fa9c3dafb053336d
-
SHA1
00cadf78e40cfd41f7536437e0d443d3580e063f
-
SHA256
93dfbdc4e5ea15af102ce1b6faf0d4f5607f78f2e09215224a64f7ac003d3451
-
SHA512
fba20029abdeda57a6257ff2b50e1e55288966b998534250a4c8579fdf7cdb977817c87da9183ae8d6ba8b32d65ae76f26e57f3a6c045e338ac9d96346f8601a
-
SSDEEP
1536:RtXgOaMvOdMM1Q3gziK+vepBQxdMZ4XzNdjeSJ5+l3pbkY:RtX721QNKKepBQG8XX5+l3/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1976 add6ad343a096b29fa9c3dafb053336d.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 add6ad343a096b29fa9c3dafb053336d.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 add6ad343a096b29fa9c3dafb053336d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 add6ad343a096b29fa9c3dafb053336d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 add6ad343a096b29fa9c3dafb053336d.exe 1976 add6ad343a096b29fa9c3dafb053336d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1976 2980 add6ad343a096b29fa9c3dafb053336d.exe 29 PID 2980 wrote to memory of 1976 2980 add6ad343a096b29fa9c3dafb053336d.exe 29 PID 2980 wrote to memory of 1976 2980 add6ad343a096b29fa9c3dafb053336d.exe 29 PID 2980 wrote to memory of 1976 2980 add6ad343a096b29fa9c3dafb053336d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\add6ad343a096b29fa9c3dafb053336d.exe"C:\Users\Admin\AppData\Local\Temp\add6ad343a096b29fa9c3dafb053336d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\add6ad343a096b29fa9c3dafb053336d.exeC:\Users\Admin\AppData\Local\Temp\add6ad343a096b29fa9c3dafb053336d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55b822195e8ed34a3988f8c4702256d21
SHA17bbaaeb8976f39faa494a15b229625e8ddbf9b55
SHA2567946eebda4696bf35a740c6385148a72a30888a0654891723532c527f705525e
SHA512d57e72d389d84c4e33cf1fc119b539439aa42caaaca769ad302b64c778126b90ddb3ac1cab2e9b2ea2fe472b12f84e51a3cf4fcfc9ff8de9390090fbc04d89c1