Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe
Resource
win10v2004-20231215-en
General
-
Target
7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe
-
Size
192KB
-
MD5
ba5c894c0b82b70505021e2ba335b8d8
-
SHA1
f5e5d2003a8a78d0d6360b31e5ec49bc2840e27a
-
SHA256
7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d
-
SHA512
91010f7bdc2151b9cd4336d610b5a9e6be9c7b99edff899f7adb80a1842c9c6148e14967b77cef5070d8123269516beceb243976698822f0f60a655340443c9d
-
SSDEEP
6144:0VOYcrJIkxx1hw4R6ZACqi/BNMS66kNIDEqZq:0VOYLkPXQZACqIB2z6MwEqZq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2852 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2852 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe 28 PID 2316 wrote to memory of 2852 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe 28 PID 2316 wrote to memory of 2852 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe 28 PID 2316 wrote to memory of 2852 2316 7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe"C:\Users\Admin\AppData\Local\Temp\7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exeC:\Users\Admin\AppData\Local\Temp\7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\7f9098df6eb9739daf17c5500f3ae27f46f8c60cfd55aea6dbb1029d0cd6039d.exe
Filesize192KB
MD5e948ac4dde9f2df4793a756ddf62f9f2
SHA162677e27d0b6e597230f7cea69434835c1ed5001
SHA256a856048c27e993e900abf1d8b4e3f387119cd843d8bfb6da1d077da68076087e
SHA512bec608a0e732cba3c3a68a5615a80efe036a2fad7762c9b0a67adccb814a9d8ed42f78381d98d80b68fac4bf8d29927d745df76984959968b45811822d46b059