Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 02:23

General

  • Target

    8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe

  • Size

    7.8MB

  • MD5

    055d0f8e81a0047a08cb0c7a176154d8

  • SHA1

    6234a3f061f4094d7f30cc0079b66521ede6c264

  • SHA256

    8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23

  • SHA512

    80b2fc1a65e7dacb3a2f167193713dded1f0b4b6b579ba521c05dc9e4470e426e566e976a8704a37a41941e8b6fb2db88678b7141e8442fe9ab61c01e80a5288

  • SSDEEP

    196608:PL9oCA/dZzMi0LbV3iUrhrLJ0LeYmgJ+N3Qnj6O+VS9:PL9oR/dFMLy4VLJMmgYN3Q5+4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe
    "C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp" /SL5="$70120,7961322,68608,C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp

          Filesize

          639KB

          MD5

          706cdb1992be136d037071e49ff196c4

          SHA1

          32c11ae46e6a2ef629e4298cc70afc25c3ae7bc8

          SHA256

          e684ea9e19961bd4933ff494a42a8426e69e63678260f9d1b8e0cdae24f1c333

          SHA512

          3db636171642162d68a3c98709b0e9eab1573570dbe6f8253340fe53276cef489b704d051eae143fff2dbb5275e3dad5c0460f1f711f80f0440efd7fec9e25d4

        • \Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp

          Filesize

          497KB

          MD5

          ed93c8460edae4f13ff85ca59f8e7c94

          SHA1

          f2d930e34cae726324b35864d3fa81d9ca37db55

          SHA256

          920fd00959631e53f32eabe160eb35012568128cd1f28144937c3e590149a00a

          SHA512

          917f88e7b96b99b6623f23dfa1fc115ea8c166dce195b43fdce8a98578803f97ac3f7ca1829dac6673ea0591963bbdbd1b5e9df41a44eae707a7ffa9066f94da

        • memory/1224-7-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/1224-10-0x0000000000400000-0x00000000004C2000-memory.dmp

          Filesize

          776KB

        • memory/1224-13-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2244-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2244-9-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB