Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe
Resource
win10v2004-20240319-en
General
-
Target
ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe
-
Size
416KB
-
MD5
c77c5cdce4ab0b61d5c74118ff51a627
-
SHA1
25efb5b7d7476458ee0e4ba73de7642f6b74f9ad
-
SHA256
ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717
-
SHA512
6a14bed27a34c773fdca9bd90dda7424b73cf1e20bd45801ded2df2be9eed8e2563e027c0b475384a57b91070f6ed9b075d35b9a027940a9c9f20451b392ce37
-
SSDEEP
6144:yLBW/KmGwDIxd5k2EjTqgfloWdDJboY4sJ9pALL7j1aFwoF:AiZGwArkU6D9d9pAi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2332 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2332 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe 28 PID 2868 wrote to memory of 2332 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe 28 PID 2868 wrote to memory of 2332 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe 28 PID 2868 wrote to memory of 2332 2868 ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe"C:\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exeC:\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe
Filesize416KB
MD5e539e9cb7af37b2414323412625d9aa3
SHA1a1a6ec3e44364f43b072967fbaec08c47d069c56
SHA25649c3c7d4a0463842933c8ae607e38771f5b75b5037a68301c84d87486eedb2e6
SHA5120c8c9f48024b1f2ec89393daaa84c73de91a8f24ecf32e9c63a5227a51a5b86897dd3c6a411e9860eec95c943c6e3cb3be50fb5591ca770da4cf11e84fd5aae6
-
\Users\Admin\AppData\Local\Temp\ad943e8822d090af7155f37abf6bd26292d1049d58a63166ff31ed18babb2717.exe
Filesize320KB
MD573bc840bc983c8c1ab97764dfdd1cbe6
SHA1cc674a2c3876f51a38a3aef6e8329c11a0412d85
SHA25611ca5bcbf59800e85d71bcfe39175a2d0ac18a6ade5367608375707fd9d32672
SHA512a6a42e7726e5be5915d33da85dcee1a26fb27c950caaa2e13abc43421e00dffd41e890944952a4ebaebf9f2b043f807792e1bce3e54205644ff5818d309eb96e