Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 21:10

General

  • Target

    63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe

  • Size

    79KB

  • MD5

    02c9bfbb123479221cc23b63c469dc7a

  • SHA1

    ee32131ea0c1f8393448ae059741fa9981c55330

  • SHA256

    63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575

  • SHA512

    d64857db3b7bab256b6386eaacc0f47128e1166aeeca1e26c790525337645f301a48ffdfb2f46d684f907694262570aa1e228786311710de33487e55f0643914

  • SSDEEP

    1536:zvdtbD/STEiCoOQA8AkqUhMb2nuy5wgIP0CSJ+5ypB8GMGlZ5G:zvdtPS7CtGdqU7uy5w9WMypN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe
    "C:\Users\Admin\AppData\Local\Temp\63b0730cda0ce46139754ecf808bcaf17a78e3ecb78a6f361f255e4d1506a575.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    7699197868b76aa59bb61b141b7a46ea

    SHA1

    685176bc5e87cbdad544b6658bcd862ed307e153

    SHA256

    193112b7e2c1f522b0c41dc1ec8c82ff168d32a717e82ab2be9c12f6bd04fa23

    SHA512

    4206f5bb2047bfbbe649a2e10ab11176b682a87b46e3de3d4fdfb8487e62c10a70179dee1bbfc6305ab9e762fa8df1fe6025f6223eebcd72e15ff1e901b31740

  • memory/2156-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2284-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB