Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe
Resource
win10v2004-20240226-en
General
-
Target
d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe
-
Size
256KB
-
MD5
49773a4dfc973524a9e5dbffe0aa998f
-
SHA1
c7a33791772fe3be8c5697318dc654461ada80d9
-
SHA256
d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486
-
SHA512
25aa82d13a42bb9c20a8b4a1ce8b4239462e5db541e61493b9f290e34aa47f74fa7f4694427c1951ab4c7c2be45e5f5d633c7980e8ddcd5dded4168bef090db1
-
SSDEEP
3072:mMusxdsDx57HkIbgL3ladOXKanTdIcmYTfyXwap6XPDTNL6SVvzbQznje7mhdAdw:KfTZgxas/OcxKXwa4//JTrbc67dAN5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2108 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2108 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe 29 PID 3048 wrote to memory of 2108 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe 29 PID 3048 wrote to memory of 2108 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe 29 PID 3048 wrote to memory of 2108 3048 d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe"C:\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exeC:\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe
Filesize31KB
MD52e60115c5998786e816198b32454db49
SHA1b500fb0bee66b32393a8244edb8a217a84f664f4
SHA256a89590bb139b90cb6dc8b2ed2170572f85e6bbc4b7f029fde12761220228333f
SHA5128eb14c1de42a38f4c1ca764885bed76eb46fb6b7c8006770b1b0df51b0030262c5d771c0d178a5f84da9727ee48e8b4e47e4a36b153219ae58fd7cac55bbc352
-
\Users\Admin\AppData\Local\Temp\d809538bd35f6dd5d9b004bbe8bc87024631414eac0b3aedbcc18f91cee94486.exe
Filesize77KB
MD5b1b8248742a160ef58ada4b09b93b8ad
SHA14a487d4f761b6a2911c081a54709f7464071c314
SHA25672975ad071e119f7a18114a2d2369fac5cec3aefcdb56bb84ee1e7a0973f0f30
SHA512940a7a255402bce9cab0de0640c30ed9bb0263e74f23407773ec3672aaa1ab6eeb7fa8c9c8f32cc4a75e581dad1d2aed943094ad5812b089679041c21d47f3eb