Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
beef692212ec123d51d8c71048ca8a55.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
beef692212ec123d51d8c71048ca8a55.exe
Resource
win10v2004-20231215-en
General
-
Target
beef692212ec123d51d8c71048ca8a55.exe
-
Size
3.0MB
-
MD5
beef692212ec123d51d8c71048ca8a55
-
SHA1
eab2293a2868177898f42adcc9a78067f93e66e9
-
SHA256
7c1d7c023dc6fb34e25ada037c122cd8c4b349ae0ea5df5b04510b0cb25a6124
-
SHA512
f024ae1df89a22155f206c1955d399a6b8f2027c44da6c26bc50fdc5cf2a523786deabe5f135bf3e0bfd1313feaad3c6cc8bf3cc5e298aa55406f51a1ddb1771
-
SSDEEP
49152:xaCvmr7nH9irrPvr14N0GRZc+udVptGX7pJ5YXIqAHd7g0bo1taKBF5fWl:YPHk3vKSsc+QVpyJ5K09ctaEF5Ol
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 beef692212ec123d51d8c71048ca8a55.tmp -
Loads dropped DLL 4 IoCs
pid Process 2160 beef692212ec123d51d8c71048ca8a55.exe 2604 beef692212ec123d51d8c71048ca8a55.tmp 2604 beef692212ec123d51d8c71048ca8a55.tmp 2604 beef692212ec123d51d8c71048ca8a55.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 beef692212ec123d51d8c71048ca8a55.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28 PID 2160 wrote to memory of 2604 2160 beef692212ec123d51d8c71048ca8a55.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\beef692212ec123d51d8c71048ca8a55.exe"C:\Users\Admin\AppData\Local\Temp\beef692212ec123d51d8c71048ca8a55.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\is-8NABL.tmp\beef692212ec123d51d8c71048ca8a55.tmp"C:\Users\Admin\AppData\Local\Temp\is-8NABL.tmp\beef692212ec123d51d8c71048ca8a55.tmp" /SL5="$50152,2686837,158720,C:\Users\Admin\AppData\Local\Temp\beef692212ec123d51d8c71048ca8a55.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
790KB
MD5953baed656f0836b0f6d343d92c1a0c9
SHA19b74f284eab2e3321aa1bff592cba97a0d9b9051
SHA256b5871cfac6d190edda34ab9aec7180301dc1bb10a120d1df09f8ede0dd451071
SHA512545454f9634a9505b9a63318b75e6ad364c75b3e40f261415d36b9f393a46d9d08c0467e3feec72510256f74800ec84eeae405a656143197405065bdfd8725f6
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df