Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
d3cd5e3d8bfe2cd2518647c7c0580832.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3cd5e3d8bfe2cd2518647c7c0580832.exe
Resource
win10v2004-20240226-en
General
-
Target
d3cd5e3d8bfe2cd2518647c7c0580832.exe
-
Size
1.9MB
-
MD5
d3cd5e3d8bfe2cd2518647c7c0580832
-
SHA1
e287324208f2ffbacc09717cb223d3167820bae2
-
SHA256
574885fcc6edf9608a66844f820d34f310e89f5f9f6584d24604dddecabe114e
-
SHA512
81021501db0f3a632b900961db64096e926738b42ff332fe5ba791d651bd2b8f050f72bf9a6878b1a94c00029cfe88b0857c44133bcfb06656875d6ee92ad1c1
-
SSDEEP
49152:Qoa1taC070dKx7f1rfD0aNYfY8cTD8RbccNm:Qoa1taC0r17oaNYfjciAcNm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1284 1AE0.tmp -
Executes dropped EXE 1 IoCs
pid Process 1284 1AE0.tmp -
Loads dropped DLL 1 IoCs
pid Process 1964 d3cd5e3d8bfe2cd2518647c7c0580832.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1284 1964 d3cd5e3d8bfe2cd2518647c7c0580832.exe 28 PID 1964 wrote to memory of 1284 1964 d3cd5e3d8bfe2cd2518647c7c0580832.exe 28 PID 1964 wrote to memory of 1284 1964 d3cd5e3d8bfe2cd2518647c7c0580832.exe 28 PID 1964 wrote to memory of 1284 1964 d3cd5e3d8bfe2cd2518647c7c0580832.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3cd5e3d8bfe2cd2518647c7c0580832.exe"C:\Users\Admin\AppData\Local\Temp\d3cd5e3d8bfe2cd2518647c7c0580832.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1AE0.tmp"C:\Users\Admin\AppData\Local\Temp\1AE0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d3cd5e3d8bfe2cd2518647c7c0580832.exe 99D704453550DB3A5F43E04695B041FB695B1F0394D2566C415415AD9B52FD82D562279D3EC37FB11E0A0BCCA1EA853365EFA5B7C375341A451214714AD77D062⤵
- Deletes itself
- Executes dropped EXE
PID:1284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD53f8849b9c38f7ade11ba1bffb9ada660
SHA154f7ca2a45a49f3471668614e689c6e10d439f10
SHA256b661fbeb1e0a89ee5af94f3cff19f8e604829d8ce1be174ab0cb25b3747da477
SHA5122f18b2b13715c232513c2bfc2bedcf65d60b57acdd0a25167c939bef7a3cb330105d0f7b3045b05b83c022236d407d299393db4da7bf6e21dafe89507855d50c