Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 20:41

General

  • Target

    565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe

  • Size

    3.5MB

  • MD5

    bf0900fecd1f36510df1524d950a1bb8

  • SHA1

    5d2ed9aef779b438cda943676fb4451962944675

  • SHA256

    565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36

  • SHA512

    ba546dac4fbb81000d02c67ee6a3e9cf43a1bcf33562e278be2e27492a3ced814176969c633e43fbae88fc5079077482984b8d59e7f70328c92a10181fd25155

  • SSDEEP

    49152:uUWTGrgI4mv+niXtXIMfX2wGBDDQ/XSHdX4MPXGgIMbb:uUWTGx4mvHXtWHdDbb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
    "C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
      C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe

    Filesize

    3.5MB

    MD5

    82c34ba4afff6595c439802a1b08420b

    SHA1

    5f7b3f2efcc57c81139fafb01e8ba9032a45f690

    SHA256

    a7a719492620ca2d7ac31889502e362bfeed8ade6d8a224d44f8b51711481e8b

    SHA512

    d86429d25b21fa7f284db137218cb8418f249c20882a8debaa4535c1012fb9f8c6f2ea4fdbe315720285c844a45fd0efa9e032f86434b8cbfbb23d48b6873583

  • memory/1808-0-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1808-6-0x0000000002FC0000-0x00000000030AF000-memory.dmp

    Filesize

    956KB

  • memory/1808-8-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/3004-10-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/3004-11-0x0000000002EE0000-0x0000000002FCF000-memory.dmp

    Filesize

    956KB