Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 21:55

General

  • Target

    75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe

  • Size

    79KB

  • MD5

    09587d958abd01f34545926ee56549d0

  • SHA1

    650b29b50b434a5231f4fd4525015281eda54de2

  • SHA256

    75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35

  • SHA512

    aa00290e5b44d82e82de9f93eb3a06188e5ab46eabbb28f10fc60e9e29937c30ac67e3e33f9ca1c1683399004ed153b9529af911d54de97b65ce349d8dd19d44

  • SSDEEP

    1536:zvdtbD/STEiCoOQA8AkqUhMb2nuy5wgIP0CSJ+5y8B8GMGlZ5G:zvdtPS7CtGdqU7uy5w9WMy8N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe
    "C:\Users\Admin\AppData\Local\Temp\75ae6bb099282fce1ea53c317ad36cf21942623cb9fd285c64a11e7e68943f35.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    21048f8f62cdf3ebe2ded216ef88691d

    SHA1

    16ff864a0b98cd26590c971ec0eb48102dca8394

    SHA256

    419a2ace128f4b29b840bcdeba8c5957ea45819547944c1cadf264e9248deda7

    SHA512

    bf1d91c66bc88ea75a84c11f0bb50d19de0ff91dcdb61784f2fa69d54ad425f81267ed4f0364bf9e64363cdba5ffc894b83e0d2e51b7b891e4e90ead6d0a2669

  • memory/2064-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2932-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB