Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
baa64743361671ec316c0d277fea0b52.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
baa64743361671ec316c0d277fea0b52.exe
Resource
win10v2004-20240226-en
General
-
Target
baa64743361671ec316c0d277fea0b52.exe
-
Size
1.9MB
-
MD5
baa64743361671ec316c0d277fea0b52
-
SHA1
10e9f8a6da174a414de3b77776f55d86715ca469
-
SHA256
e938b6b70bac762e48f3eb424960822bdd507703a20b9d809a500cadab84cbdd
-
SHA512
44b9d7a2468be3b22c6d17a72f3e30d472f49489eb207310420108a5548891fa34d08b1f61627f627406c4b3325f27e4550912f812e9029368445edb07210fcf
-
SSDEEP
49152:Qoa1taC070dxCEhjMlAB1tlRKa3fgX/ckVbksRhzs5F:Qoa1taC0shjMlyR534XUk1kQ5sf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1936 17E4.tmp -
Executes dropped EXE 1 IoCs
pid Process 1936 17E4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2260 baa64743361671ec316c0d277fea0b52.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1936 2260 baa64743361671ec316c0d277fea0b52.exe 28 PID 2260 wrote to memory of 1936 2260 baa64743361671ec316c0d277fea0b52.exe 28 PID 2260 wrote to memory of 1936 2260 baa64743361671ec316c0d277fea0b52.exe 28 PID 2260 wrote to memory of 1936 2260 baa64743361671ec316c0d277fea0b52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa64743361671ec316c0d277fea0b52.exe"C:\Users\Admin\AppData\Local\Temp\baa64743361671ec316c0d277fea0b52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\17E4.tmp"C:\Users\Admin\AppData\Local\Temp\17E4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\baa64743361671ec316c0d277fea0b52.exe FA5203C3FDE77B6DADD97F7AF10FFE211AA62D1ABF34038F90493B733A160D294458ACF1C08C4FF7E98DE3EB5ED3F7716663878933A53CE37BBBA7E79FCD0D622⤵
- Deletes itself
- Executes dropped EXE
PID:1936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f4dc01dd9513db5b1c026c889e1a5ff9
SHA1299a878c44f35fffaeb5f22ffcea2b099cde5a1b
SHA256c2b76a9abfbc6cdd08ed446fd2bfa911c7c1feef28cfe8da9f52cf852dff889b
SHA51252295537676c090451713df8b3c3eb48ed4e327d0b5c5acc6192b56c6a8864eaa5222f82db41c442b762e55ba603e5594988efeb3950cfb7757a2fe2fc31d52e