Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
c527b81d5626eda66dce76294a0791cd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c527b81d5626eda66dce76294a0791cd.exe
Resource
win10v2004-20240226-en
General
-
Target
c527b81d5626eda66dce76294a0791cd.exe
-
Size
4.2MB
-
MD5
c527b81d5626eda66dce76294a0791cd
-
SHA1
4c7f422cdffde3d2d30144308aa999acad2085f2
-
SHA256
b1ee782c14a3d7a73fe47e8a57a60b29dcd4b3286b094f8170b603585c866c7d
-
SHA512
1b36076fb6bf15224801505ad1b2953996db52c23a51c78588b10e9ae493a6bf42b3dc5367208767398a7c7b80d5b84c54f41251596904e01b0b5667fc59f917
-
SSDEEP
98304:emhd1UryeNvY1Q1fVJP/VLUjH5oxFbxCVLUjH5oxFbx:elAGBVUjZEdCVUjZEd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 A064.tmp -
Loads dropped DLL 1 IoCs
pid Process 2208 c527b81d5626eda66dce76294a0791cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2744 2208 c527b81d5626eda66dce76294a0791cd.exe 28 PID 2208 wrote to memory of 2744 2208 c527b81d5626eda66dce76294a0791cd.exe 28 PID 2208 wrote to memory of 2744 2208 c527b81d5626eda66dce76294a0791cd.exe 28 PID 2208 wrote to memory of 2744 2208 c527b81d5626eda66dce76294a0791cd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c527b81d5626eda66dce76294a0791cd.exe"C:\Users\Admin\AppData\Local\Temp\c527b81d5626eda66dce76294a0791cd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\A064.tmp"C:\Users\Admin\AppData\Local\Temp\A064.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c527b81d5626eda66dce76294a0791cd.exe 002681AE28546949F8C0162CC2FCABA0E2AF3A93753E282441BA75B5DC8BDDEC1FFC2F7E0A450D0EB727F2E4FFDB86734C4BF56EC8D1E97421ABFF4E48C432BF2⤵
- Executes dropped EXE
PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD53cfacda6f9a706bd65256c7cc32c36da
SHA1bd518e4b20cb3d91f489cf8a1c1032def38f857e
SHA256ae4683c8feddfd0af243b4be8a21c5b0ecb96f2b66a54221a69f1bd5639b195d
SHA512bc071881ec9f8761aa34c81c285dc9ead344ea05c986058c9ce68c1a14dc6af55c6b69aaf7256b485d7afd4e79a4f3a19c0314370cb39ae08a5e4aecdfec958b
-
Filesize
1.6MB
MD59f4b6db775ded520a2914621b3c877c5
SHA11a1fbaee127b6d37a6c2f263519e9ce615fa2814
SHA256d4be5e2202a03a1fb3ee450f3a7b72039f62c3dd1ae905990047743b68c02b65
SHA512aa8b65c992af5b80a30cd62af0d70d75e129f090a691e635be5519e0873537af4331ac2d208e61e28924438a8a11c00c60e3e13a6c23a952b311f3b1395f3a1f