Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 21:51

General

  • Target

    917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe

  • Size

    2.3MB

  • MD5

    5a1ab38174118460e27e429d1bf63b53

  • SHA1

    04bcd2417e72cc122a19b95888c1f87ce2704d14

  • SHA256

    917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74

  • SHA512

    474e21f6ead0736e8fac67952afd59fd2aaf1861272238cfa3c8b85580e46fced9927c2733bc63f3146de80013602bee973d21a9c9d9eb8be391efe9ffdbe125

  • SSDEEP

    24576:D1tJsza+a/ZSkJovBYLYsSwdaJ+4h99Fm+ci2a/ZSrJovBY:BTUg+h7Q+F2g

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
    "C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
      C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2628

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe

          Filesize

          2.3MB

          MD5

          88dcdc2699578abe9855798d2d562a60

          SHA1

          1bb9448840c60eb48b05633b79034656d7cef49b

          SHA256

          02bd6a73c6cfe88268b608014a0aa2c48e3c9fa5b4a77f14251d404991802713

          SHA512

          7909c042e0c8eee6e98d3acb071997ba5217da4728de21c443f2fc2b66b02838cb2715950ddc3b81d2990605fff48929009fedbcbdbaaae1852323233d66c611

        • memory/768-0-0x0000000000400000-0x00000000004ED000-memory.dmp

          Filesize

          948KB

        • memory/768-7-0x0000000000400000-0x00000000004ED000-memory.dmp

          Filesize

          948KB

        • memory/1508-9-0x0000000000400000-0x00000000004ED000-memory.dmp

          Filesize

          948KB

        • memory/1508-10-0x0000000002E10000-0x0000000002EFD000-memory.dmp

          Filesize

          948KB