Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe
Resource
win10v2004-20240226-en
General
-
Target
d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe
-
Size
272KB
-
MD5
efe65a6897286dae78aff9a3b12c3e36
-
SHA1
8d345621b3cac363c7cd27a3e6f8df37a7bef170
-
SHA256
d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e
-
SHA512
33a755f2a00b99ed1d8e3705e4c344ddbf2d65556570842e2dd7d7910fb2be27ed6963efac03cb1f99536f7edb7ca11517772e88d12619398cc5596cdb9ead3f
-
SSDEEP
6144:c8wmhbQUvetZQTkTqh+kZrBjIcE9yy6atBWOw:tFhbnEZQTkTqh+8ljbE97tA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2900 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2900 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe 29 PID 2164 wrote to memory of 2900 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe 29 PID 2164 wrote to memory of 2900 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe 29 PID 2164 wrote to memory of 2900 2164 d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe"C:\Users\Admin\AppData\Local\Temp\d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exeC:\Users\Admin\AppData\Local\Temp\d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\d47def7ed7122bef5c7e400d8dc2bb39830a0d9b076b19d3c0313e2210962c6e.exe
Filesize272KB
MD5abadfed01895fd83255cf47ab41ae459
SHA1d0e758d9154cff5e92968f7833b38e48e6d8c8c2
SHA25695eb471c3cb1e43bf5b04a274f3063c2a55e0aaeb573d45dd28355e04cea2a64
SHA51229047879dc57171590071aa854ffb7654bb87c9e07bc5d6e45c9940da0aa600a40912eec0df4af9b47fc68015ac095ee5796c3776bdc8846ee0d8fd2e0ff3da9