Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 18:52

General

  • Target

    c419ac71273abd41780450ece9da229b.exe

  • Size

    1.9MB

  • MD5

    c419ac71273abd41780450ece9da229b

  • SHA1

    03e902d49dbf2c66c4da267f806095ebc29d08c0

  • SHA256

    cf5bf293e66145d8725855231f37e4529b545385c34c5d12b69fb9416a6312f0

  • SHA512

    6225dfdcffd3149d23839933aabd58303c8ad1b9a02d7a727728a9410a40cc159ed6ca7eb6be8d18843b1850d998778f78e3126d4f06e652747584cf84f62bf3

  • SSDEEP

    49152:Qoa1taC070deNxZfarW+WWwG976fEbwOl65kFYZT/vlmjSsZ:Qoa1taC0ZNTyrW+W26oL8SF0hw/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c419ac71273abd41780450ece9da229b.exe
    "C:\Users\Admin\AppData\Local\Temp\c419ac71273abd41780450ece9da229b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\61CF.tmp
      "C:\Users\Admin\AppData\Local\Temp\61CF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c419ac71273abd41780450ece9da229b.exe E2292CC177B48363A4F3098F1415C265136DE8C23F02ADCFD783E1F7D46BDD0CBA1DE4D1C33E07FAFA04B9970D8D60642CDABAB7C82FF6612F743F813FD9BC4D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\61CF.tmp

    Filesize

    1.9MB

    MD5

    3756f69ae884413125630119b268de07

    SHA1

    f2eff129dd404fabf48376b085128c3e69a54721

    SHA256

    74f810c1604ec393ad75684b8506f7fb79c5a43219c233fb6d51c35376eaafaa

    SHA512

    9614f4f9546dbfd702993e747cd3d21d95027d6ee5e7ed239538a753a875eb915974b0570a1066ce1a412df4a00a37476d19504f681554bfcb93e757b7e163a2

  • memory/1992-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2748-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB