Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 15:44

General

  • Target

    c641bd466bd10694388f756cae5dc2b7.exe

  • Size

    1.9MB

  • MD5

    c641bd466bd10694388f756cae5dc2b7

  • SHA1

    181542c344b070301d72eac2d7d38e778d1d8dec

  • SHA256

    9bbd3eaaee2caf6d335393f4f631d60b9de9a57b5ef6abe6911f1ebaaf6bc361

  • SHA512

    812bb9e245f338ab30ccecd778234dc37fc268aac3ee7429c5c89da3276f39f69fb1190fcb620e96d880647a1287e42edf7e266321564506ead0a5613174ca95

  • SSDEEP

    49152:Qoa1taC070drtJKU5p4181zA2N0Bp7Womw:Qoa1taC0Atpt5N0f7J

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c641bd466bd10694388f756cae5dc2b7.exe
    "C:\Users\Admin\AppData\Local\Temp\c641bd466bd10694388f756cae5dc2b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\1258.tmp
      "C:\Users\Admin\AppData\Local\Temp\1258.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c641bd466bd10694388f756cae5dc2b7.exe A91AC8D1EEA26D5A6730EDDD9EA7CD82E89DACF54F37367A8880EB59AA981D0D8FFE7D5D0E288A9AC56A0318F79212EA51EA6AA342C349682E2F3910EE4791E6
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:784

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\1258.tmp

          Filesize

          1.9MB

          MD5

          76aec52481845aef38b7fa087ff2e5a3

          SHA1

          9dd55ad9cf9745d751920f0f91d6f92cb96ad651

          SHA256

          eb80967c5b24d8130245322ba1203a7363ee48038a098800eee4c8cdd4063eac

          SHA512

          bb624e3e654911f14102cbec5e2d0853475649c873da432c24fd93700ecae2341300259c93c23978617db16c110ed6a0a27f2517f432e79b20be5e782c71ff2e

        • memory/784-6-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/2216-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB