Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 13:18

General

  • Target

    d636ad5b80658c9873895c1622093f5e.exe

  • Size

    1.9MB

  • MD5

    d636ad5b80658c9873895c1622093f5e

  • SHA1

    844c96a3e0bd7a366361fb64e69aabde00eb9d52

  • SHA256

    8d663b4419b2be242547bc070c2b4bd6b08f5e8cbaa212497be2cdaf7c308d41

  • SHA512

    3a643ff0db5b51b4210cf464c12c18af9f1933edeb745e9f1fac9d8a8094ffb882d5fd94e0f457e5e63134ca6eb61d7108d9bfd172587154a754a6c3d9d39729

  • SSDEEP

    49152:Qoa1taC070dQ69KMnhwlxtUSydEI20v35W:Qoa1taC0C9KUelxGTda

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\2684.tmp
      "C:\Users\Admin\AppData\Local\Temp\2684.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe 32F4DEFF090C295F4D0D66A3E115231F559608796E3D72894ADD084E9B120D565237086124BE0DD59482C59460D4E87A300F416A315734F61862FA24A7631C79
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2420

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2684.tmp

          Filesize

          1.9MB

          MD5

          cbd2bcfbc65cd9dbbe97d0128784141d

          SHA1

          26c266798825a692b7409e0778ad6357f9a7ec15

          SHA256

          d2bf225d34135a35a85cad65763350eb8898aa3d7865916aadc2f7d5ae898b0c

          SHA512

          f8bb9f6a9cd8e0cd16028a3e27b562ff0b26b20d1ce8d270c931e2b33edc1f6374cddfeee6a6d0d01938793de2ab83f0e50e44fad21c015d5d9252be25d573af

        • memory/1460-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/2420-6-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB