Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 23:30

General

  • Target

    bd16b24238dc39c73ec707c903fc1132.exe

  • Size

    1.9MB

  • MD5

    bd16b24238dc39c73ec707c903fc1132

  • SHA1

    1f5d76c9de2653612607ce7bf8981124ea8ed494

  • SHA256

    0a641ddac523ff443a8def5806793fcc88f9036cd6d47cd36da6b44ac871e9d3

  • SHA512

    ea2768b59a0f9e91d755f10a39a87f214ac8449ecc841048d3800c6232fe03107d31c47f3df023b0efc9247c3d82c5fc20c23ba8ccd2bd8dc90cc5caadd0bcbb

  • SSDEEP

    49152:Qoa1taC070djjaLPSVcKsuPz7nL+pB2Os05:Qoa1taC0wjqt8zbK2NO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd16b24238dc39c73ec707c903fc1132.exe
    "C:\Users\Admin\AppData\Local\Temp\bd16b24238dc39c73ec707c903fc1132.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\3F61.tmp
      "C:\Users\Admin\AppData\Local\Temp\3F61.tmp" --splashC:\Users\Admin\AppData\Local\Temp\bd16b24238dc39c73ec707c903fc1132.exe A5A672B636B47DE8F6F3AD5A9D08B047A0D5DAB3E7FE6E9EF008AC025EA6F448BDE08355441BD13E565F2AD71BE08B5C599C6940D95FE962419AC364AEBC1816
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\3F61.tmp

    Filesize

    1.9MB

    MD5

    9b144c644c8892e9adc97ecfe72fa574

    SHA1

    06c1c109285a6e98abba7b17edfaf59453e74584

    SHA256

    0a727e421ef841b6d0df6784e4cd2717ca38ed305d91f9508a4683058d047606

    SHA512

    8bd4719349bae510ecc1e040b673bf137e0ca6c884668e7bcb51b2eaec2a5d20f6d69d5d6e862584973df8db313706d53001f58866a9483d4f9b5f7b9bafbb4b

  • memory/852-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2256-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB