Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 02:47

General

  • Target

    b650b2c7028710fdbcfed27069cd81b5.exe

  • Size

    1.9MB

  • MD5

    b650b2c7028710fdbcfed27069cd81b5

  • SHA1

    376486e40cc7739343c43429921956e25603317c

  • SHA256

    035112c50ae770cc569fd8a9d30b2f1212ef8da2240580b4bd92614f79cc549a

  • SHA512

    5552bec0ce2ef01d67cf89e81af97b7aca1486133546afb766ed03289f38b18ea96c63aaf671aba1672c7073de838221713c401aa6817e49b49a20d849ac6be7

  • SSDEEP

    49152:Qoa1taC070dMY4MNesNb8LOkwotNLcWC6NbIrZa/eSe:Qoa1taC0p5W8LOkrLc9Ub6aGB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b650b2c7028710fdbcfed27069cd81b5.exe
    "C:\Users\Admin\AppData\Local\Temp\b650b2c7028710fdbcfed27069cd81b5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\DB7.tmp
      "C:\Users\Admin\AppData\Local\Temp\DB7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b650b2c7028710fdbcfed27069cd81b5.exe ACA2B512DD13AE88B1E05BE748A51D82238E15608F6921FBD9FAC2E39A282709EC305909245DF07F0C9B9DAA3F02D7F2BAF48B765F910B4E33EFE1561AD7B579
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\DB7.tmp

    Filesize

    1.9MB

    MD5

    289a802513fab759b5924afdbe53e5fa

    SHA1

    66ce4046ca71915b912528f613aeca99aadbcd85

    SHA256

    746d99a5d87d838027f3d18a99a6ba7137f0df19d5d19ba079583b037d99e866

    SHA512

    1730bfcbd9b95232abbcfd3c3d580ff9b89a2f7652993bab05396d325c9fd310c59ffa63a929614fa890de7e30ccd65903dce511b416d0e8306a23ed495d4792

  • memory/1640-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/1656-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB