Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe
Resource
win10v2004-20240226-en
General
-
Target
0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe
-
Size
479KB
-
MD5
092c508f6ce95b6ecfb7cf3d28fc7e3b
-
SHA1
1dcf8e2769947b31c43d463d2c2faa956ee249a9
-
SHA256
0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed
-
SHA512
04e9a19803da544ef9de7bb94f9b85a3bd62c0fca1376844a004a36ff8423e893f159fd1b6d41444ea9c44aebdc264c8bd87c112a55ba9dea07f2f568cccb08d
-
SSDEEP
12288:9KfglCnfVtdW/sEzrWtHOw0iFauY/B/dEc0i3rALrbEcgYwuGggfcj:9eqCnfVtdW/sEzrWtHOw0iFauY/B/dEx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe -
Loads dropped DLL 1 IoCs
pid Process 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2532 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2532 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe 28 PID 2572 wrote to memory of 2532 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe 28 PID 2572 wrote to memory of 2532 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe 28 PID 2572 wrote to memory of 2532 2572 0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe"C:\Users\Admin\AppData\Local\Temp\0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exeC:\Users\Admin\AppData\Local\Temp\0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\0e06fe1a934ccbb5137a7ac34f18295a194bbc2ed7b538d549a9e8beefccefed.exe
Filesize479KB
MD5b6ecde98d045763e2778566885cef954
SHA112bb2bafb801339f877e3690b2c0cd517519c022
SHA25666bdc9aacb2d2d93c0c1af5ed3219fa81b1510b9c4b76cfdae23f709111dd49b
SHA512a0bbba06d65534563e5bfa648ed4fb518b39b4bc496fd6362233f62a0e3d40790910867bad90d76c5ad242b65f669626a287726e1ec09dcfebb78fa0efb36920