Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe
Resource
win10v2004-20240226-en
General
-
Target
8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe
-
Size
7.8MB
-
MD5
055d0f8e81a0047a08cb0c7a176154d8
-
SHA1
6234a3f061f4094d7f30cc0079b66521ede6c264
-
SHA256
8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23
-
SHA512
80b2fc1a65e7dacb3a2f167193713dded1f0b4b6b579ba521c05dc9e4470e426e566e976a8704a37a41941e8b6fb2db88678b7141e8442fe9ab61c01e80a5288
-
SSDEEP
196608:PL9oCA/dZzMi0LbV3iUrhrLJ0LeYmgJ+N3Qnj6O+VS9:PL9oR/dFMLy4VLJMmgYN3Q5+4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp -
Loads dropped DLL 1 IoCs
pid Process 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1224 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28 PID 2244 wrote to memory of 1224 2244 8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe"C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp"C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp" /SL5="$70120,7961322,68608,C:\Users\Admin\AppData\Local\Temp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp
Filesize639KB
MD5706cdb1992be136d037071e49ff196c4
SHA132c11ae46e6a2ef629e4298cc70afc25c3ae7bc8
SHA256e684ea9e19961bd4933ff494a42a8426e69e63678260f9d1b8e0cdae24f1c333
SHA5123db636171642162d68a3c98709b0e9eab1573570dbe6f8253340fe53276cef489b704d051eae143fff2dbb5275e3dad5c0460f1f711f80f0440efd7fec9e25d4
-
\Users\Admin\AppData\Local\Temp\is-0MPJO.tmp\8dad3939ac0b3554274d325cc996c39804c9b5c28a5de54af695ff5fb4bd9a23.tmp
Filesize497KB
MD5ed93c8460edae4f13ff85ca59f8e7c94
SHA1f2d930e34cae726324b35864d3fa81d9ca37db55
SHA256920fd00959631e53f32eabe160eb35012568128cd1f28144937c3e590149a00a
SHA512917f88e7b96b99b6623f23dfa1fc115ea8c166dce195b43fdce8a98578803f97ac3f7ca1829dac6673ea0591963bbdbd1b5e9df41a44eae707a7ffa9066f94da