Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe
Resource
win10v2004-20240226-en
General
-
Target
c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe
-
Size
32.3MB
-
MD5
cd760bd52b9fad43eb153f2e4ad8ed05
-
SHA1
39e8b437f70636caa161de8d499278f008ca6ee0
-
SHA256
c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027
-
SHA512
b8fc90d218fc62d3905a32303a8fc2e192549d6224ea8ea2d9ab9ab4d00db135c213046dd5abbd7fb156b94c321a88db27778872b0e6194c905209d95ea56e3f
-
SSDEEP
786432:EsdKOzRHl3/TxVFNSqqczwtBNjTl8W6b1:lNFH5/PFp0zNn/6b1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp -
Loads dropped DLL 1 IoCs
pid Process 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28 PID 1992 wrote to memory of 2032 1992 c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe"C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp"C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp" /SL5="$80122,32924146,812544,C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp
Filesize2.4MB
MD523ff6c907c622a04ccd772b3547c4b94
SHA11398eda4427a556115009dfaa19cd2d62a9d7a3f
SHA256b1c6aa904c35f5fac633b2c2f27901c727fbaa5e6c21050331f1ba845af07de4
SHA5123878958e48205e41f64ed67be65b61967f52712623f94713bf60d44103539d0a69d019e6a6caa2e82e88750e960795f4ced20accb5bf0ea923192197553100b2
-
\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp
Filesize1.7MB
MD55e0a025052d5a7ebd7670991c17911c9
SHA172c5fcf9933c44c075114bcafd9ce83a5c55cfd5
SHA256a67e6aa2aa82a5ef8475d7724306058c37a682e7e3b134e58a34fa8349c209b7
SHA5125378822ab2e2557739871d07f86bcd66a3dc0a783b2ee7d557029ec01d14545492aa46bd3a505a4ea0d849046dfe430461e4c3871b5c500a369915493439256f