Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 02:57

General

  • Target

    c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe

  • Size

    32.3MB

  • MD5

    cd760bd52b9fad43eb153f2e4ad8ed05

  • SHA1

    39e8b437f70636caa161de8d499278f008ca6ee0

  • SHA256

    c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027

  • SHA512

    b8fc90d218fc62d3905a32303a8fc2e192549d6224ea8ea2d9ab9ab4d00db135c213046dd5abbd7fb156b94c321a88db27778872b0e6194c905209d95ea56e3f

  • SSDEEP

    786432:EsdKOzRHl3/TxVFNSqqczwtBNjTl8W6b1:lNFH5/PFp0zNn/6b1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe
    "C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp" /SL5="$80122,32924146,812544,C:\Users\Admin\AppData\Local\Temp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp

    Filesize

    2.4MB

    MD5

    23ff6c907c622a04ccd772b3547c4b94

    SHA1

    1398eda4427a556115009dfaa19cd2d62a9d7a3f

    SHA256

    b1c6aa904c35f5fac633b2c2f27901c727fbaa5e6c21050331f1ba845af07de4

    SHA512

    3878958e48205e41f64ed67be65b61967f52712623f94713bf60d44103539d0a69d019e6a6caa2e82e88750e960795f4ced20accb5bf0ea923192197553100b2

  • \Users\Admin\AppData\Local\Temp\is-K9MU6.tmp\c4dfbb8347ada9f44f967a3e33c420bd43c2dc184894fd08997792b5dc9d5027.tmp

    Filesize

    1.7MB

    MD5

    5e0a025052d5a7ebd7670991c17911c9

    SHA1

    72c5fcf9933c44c075114bcafd9ce83a5c55cfd5

    SHA256

    a67e6aa2aa82a5ef8475d7724306058c37a682e7e3b134e58a34fa8349c209b7

    SHA512

    5378822ab2e2557739871d07f86bcd66a3dc0a783b2ee7d557029ec01d14545492aa46bd3a505a4ea0d849046dfe430461e4c3871b5c500a369915493439256f

  • memory/1992-1-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1992-10-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/2032-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2032-11-0x0000000000400000-0x000000000070D000-memory.dmp

    Filesize

    3.1MB

  • memory/2032-14-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB