Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
d636ad5b80658c9873895c1622093f5e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d636ad5b80658c9873895c1622093f5e.exe
Resource
win10v2004-20240226-en
General
-
Target
d636ad5b80658c9873895c1622093f5e.exe
-
Size
1.9MB
-
MD5
d636ad5b80658c9873895c1622093f5e
-
SHA1
844c96a3e0bd7a366361fb64e69aabde00eb9d52
-
SHA256
8d663b4419b2be242547bc070c2b4bd6b08f5e8cbaa212497be2cdaf7c308d41
-
SHA512
3a643ff0db5b51b4210cf464c12c18af9f1933edeb745e9f1fac9d8a8094ffb882d5fd94e0f457e5e63134ca6eb61d7108d9bfd172587154a754a6c3d9d39729
-
SSDEEP
49152:Qoa1taC070dQ69KMnhwlxtUSydEI20v35W:Qoa1taC0C9KUelxGTda
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 2684.tmp -
Executes dropped EXE 1 IoCs
pid Process 2420 2684.tmp -
Loads dropped DLL 1 IoCs
pid Process 1460 d636ad5b80658c9873895c1622093f5e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2420 1460 d636ad5b80658c9873895c1622093f5e.exe 28 PID 1460 wrote to memory of 2420 1460 d636ad5b80658c9873895c1622093f5e.exe 28 PID 1460 wrote to memory of 2420 1460 d636ad5b80658c9873895c1622093f5e.exe 28 PID 1460 wrote to memory of 2420 1460 d636ad5b80658c9873895c1622093f5e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe"C:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\2684.tmp"C:\Users\Admin\AppData\Local\Temp\2684.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d636ad5b80658c9873895c1622093f5e.exe 32F4DEFF090C295F4D0D66A3E115231F559608796E3D72894ADD084E9B120D565237086124BE0DD59482C59460D4E87A300F416A315734F61862FA24A7631C792⤵
- Deletes itself
- Executes dropped EXE
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5cbd2bcfbc65cd9dbbe97d0128784141d
SHA126c266798825a692b7409e0778ad6357f9a7ec15
SHA256d2bf225d34135a35a85cad65763350eb8898aa3d7865916aadc2f7d5ae898b0c
SHA512f8bb9f6a9cd8e0cd16028a3e27b562ff0b26b20d1ce8d270c931e2b33edc1f6374cddfeee6a6d0d01938793de2ab83f0e50e44fad21c015d5d9252be25d573af