Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
c848edb1dbd33c3b9ec100671c6b0795.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c848edb1dbd33c3b9ec100671c6b0795.exe
Resource
win10v2004-20240226-en
General
-
Target
c848edb1dbd33c3b9ec100671c6b0795.exe
-
Size
1.9MB
-
MD5
c848edb1dbd33c3b9ec100671c6b0795
-
SHA1
cac2786924b479a0b43c1eb6d4591115885f80c8
-
SHA256
e19d90bc7affd02709a35b224780e52797ec1e7834a937c7946a7363a711b8c3
-
SHA512
76a740d7ff2f6051f433081892047217dc8c986a3d324182b585165707fefc2b16e0ccc1ab563b9550d1486b12e1c3952b6732b9951d95e14a3f0f6c97d08ab2
-
SSDEEP
49152:Qoa1taC070d27d8wi7xr9BbWpuvYcSJ/FHBgS:Qoa1taC0f7zi7p90aYc0/vV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1744 170A.tmp -
Executes dropped EXE 1 IoCs
pid Process 1744 170A.tmp -
Loads dropped DLL 1 IoCs
pid Process 856 c848edb1dbd33c3b9ec100671c6b0795.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 1744 856 c848edb1dbd33c3b9ec100671c6b0795.exe 28 PID 856 wrote to memory of 1744 856 c848edb1dbd33c3b9ec100671c6b0795.exe 28 PID 856 wrote to memory of 1744 856 c848edb1dbd33c3b9ec100671c6b0795.exe 28 PID 856 wrote to memory of 1744 856 c848edb1dbd33c3b9ec100671c6b0795.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c848edb1dbd33c3b9ec100671c6b0795.exe"C:\Users\Admin\AppData\Local\Temp\c848edb1dbd33c3b9ec100671c6b0795.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\170A.tmp"C:\Users\Admin\AppData\Local\Temp\170A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c848edb1dbd33c3b9ec100671c6b0795.exe D2B018EE645E4B5719C2D63795773E9AC7D552102E8CD29C2F3D413876A831AF27EEEFC2291F4CBAFCD48D14B389A5AA9CA780DFFAEA4C0549D74E14AE0C42062⤵
- Deletes itself
- Executes dropped EXE
PID:1744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59a855e8e91a65ecedfe6e2e3a5e057fb
SHA1052c0409c3a3750aed6de5104754b3e4f8a89023
SHA25696b2d4ad730c27ee52ed298c6c0c71f8a71d855ac577c9fde456187c60c0f6fc
SHA5122431b0aacff3ddd9306c06fa5dc5cd6dcd746d16bbd931247e96609bdf74b3f49941f1f281cf8d6b83fefbb7c8ddd89bda54af68786f1d8b4f83ade800e36777