Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe
Resource
win10v2004-20240226-en
General
-
Target
81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe
-
Size
476KB
-
MD5
cea1e1e976209369c230d8a449c44e39
-
SHA1
0925c4e64ad02ac82fa8d82c14f2e5be7d7c595f
-
SHA256
81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5
-
SHA512
819a31ec083c12fde5716473830be6ca57fc2239d8ef029534b84a7dbfbca0391268fd87aa7b849118a94746521e4a95782407155092864b3cef29dc224f1461
-
SSDEEP
12288:aO4rfItL8HRGzICZ7qTyPp7K9wlsDpVFd:aO4rQtGRGsc+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1888 5F01.tmp -
Executes dropped EXE 1 IoCs
pid Process 1888 5F01.tmp -
Loads dropped DLL 1 IoCs
pid Process 1568 81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1888 1568 81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe 28 PID 1568 wrote to memory of 1888 1568 81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe 28 PID 1568 wrote to memory of 1888 1568 81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe 28 PID 1568 wrote to memory of 1888 1568 81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe"C:\Users\Admin\AppData\Local\Temp\81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\5F01.tmp"C:\Users\Admin\AppData\Local\Temp\5F01.tmp" --helpC:\Users\Admin\AppData\Local\Temp\81b171b3a7ea2d979413b429d565f1bed98f9fb900eb78c32c4cb695378ad5d5.exe F5003AC3A9D4DE0B8E77A5D62294530238CDC3B82B5618F224C966170FB914D7BF1E526D39C47E9B85811F8C7C67DAE940EFFF6E9CA2F149C99B906F8E6C18B92⤵
- Deletes itself
- Executes dropped EXE
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD521df085f78cd81c5f70f910161d4e77e
SHA15236e26c613ea7dca2aba4d3a72b628896a7f8a7
SHA25607aec4bf9176709dbd8c9a7f1dfce35bc432df466b70b2f7140e588a37f761fb
SHA51274506e1856072e9aff91ede0ce1657fb599398621c68fa17711b22e8d6fc4e64e43268971ae15a2982a71fe3336641b9e8b3d7c2a4e6be20507414d48395fcee