Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
7d7e430a09765d2e2196580e84b44f6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d7e430a09765d2e2196580e84b44f6e.exe
Resource
win10v2004-20240226-en
General
-
Target
7d7e430a09765d2e2196580e84b44f6e.exe
-
Size
433KB
-
MD5
7d7e430a09765d2e2196580e84b44f6e
-
SHA1
f21269595ad5792fc44e2300e338c1d74b6259cf
-
SHA256
4bff22f5f702bf8abb40266ac285affda4a54782eb705ed366e730755cf1fc4b
-
SHA512
ed45de1f37877f7a039430f6917378a66b811704db2eb846f8a92b7eaf4e3952c1ddffce6e1a317d3d7157ec20c098fc035d3a240ffaab133fadfcb36777e173
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvXOAWAxk3souUKXcaWkkeTSzw5zlR/cDC2xE:Ci4g+yU+0pAiv+QRsUHmiwdlRojYn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1724 4D84.tmp -
Executes dropped EXE 1 IoCs
pid Process 1724 4D84.tmp -
Loads dropped DLL 1 IoCs
pid Process 2292 7d7e430a09765d2e2196580e84b44f6e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1724 2292 7d7e430a09765d2e2196580e84b44f6e.exe 28 PID 2292 wrote to memory of 1724 2292 7d7e430a09765d2e2196580e84b44f6e.exe 28 PID 2292 wrote to memory of 1724 2292 7d7e430a09765d2e2196580e84b44f6e.exe 28 PID 2292 wrote to memory of 1724 2292 7d7e430a09765d2e2196580e84b44f6e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7e430a09765d2e2196580e84b44f6e.exe"C:\Users\Admin\AppData\Local\Temp\7d7e430a09765d2e2196580e84b44f6e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp" --helpC:\Users\Admin\AppData\Local\Temp\7d7e430a09765d2e2196580e84b44f6e.exe 5392F4287768159C3AD4528A977CD9C25C6A4C24E47AF0F620360C1D86B77553A654735DDC52F1E49BE1350BA1822BC7C55EB26E8D56901E5BD16F7C8F912CE02⤵
- Deletes itself
- Executes dropped EXE
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD581eb2f4b4756f300897695ad71a4a9a8
SHA188ad44398242565d3aa58fc810842ff6925e2878
SHA2561903ab9a1ed0a846e25b67b65b48e31eff2216e7e04e15d58c090db9743e69f5
SHA512bb5cc5da1c622929ab13d002cfebf656e61c2cc130f8c127fa7b7df84b236ca46c1a7cbfdead69197c94b6c9cb45ffd54a9042dfe0357fa51fd95784449a6f55