Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 19:03

General

  • Target

    5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe

  • Size

    448KB

  • MD5

    4fa53bb6ef6deb9235b6618d6f84dbae

  • SHA1

    3c47006b34395ae93684e90f252fb9fe09be1d26

  • SHA256

    5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427

  • SHA512

    8add1bf1b8f1ca13a79a28d9a6b449d2d750b40432ffbfb62ca956034989be7fe4332d26424396e41193fbcdbf031e9620759ffcad88828a7b094f9dafa35b81

  • SSDEEP

    6144:IbOWB+PW1OSwO4XwVmXw0s9wp5X9NNIDEqZK0W7cyqCxSngmMBqfycuPbUl0i5cx:IbOqWXWwZbwEqZQ0npM4dl0v5JdmY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe
    "C:\Users\Admin\AppData\Local\Temp\5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe
      C:\Users\Admin\AppData\Local\Temp\5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:3044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5996d5ab99cee9408ac83818bb91ddb54f80840363a6da504ba06131cb6bc427.exe

    Filesize

    448KB

    MD5

    6083b17165e1f59459f294d6b6da0337

    SHA1

    c7a6cb83ea6288203447c2de6a1ba7cc695088f1

    SHA256

    ad1a43109e9a97140df882f6fa54eabfe9ac80f118dc49afc078b360e2807da6

    SHA512

    e7315f183bd6201011fbc335bf965e9284e2c2d540b1990a65654319b08f5281b23bfee4874af54f6ac910d3691ac1c14453e9cb6938bed9aba108b4ce227e1b

  • memory/1460-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1460-6-0x00000000000C0000-0x00000000000F8000-memory.dmp

    Filesize

    224KB

  • memory/1460-10-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3044-12-0x0000000002B80000-0x0000000002BB8000-memory.dmp

    Filesize

    224KB

  • memory/3044-14-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3044-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB