Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
dfe182517a87fa581c1cbe91177b43c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfe182517a87fa581c1cbe91177b43c8.exe
Resource
win10v2004-20240226-en
General
-
Target
dfe182517a87fa581c1cbe91177b43c8.exe
-
Size
82KB
-
MD5
dfe182517a87fa581c1cbe91177b43c8
-
SHA1
1020b5019f40763653e6b73de949d0c65337192a
-
SHA256
9876dd9d751a5af9e5c572f79b56f613ed71db7b273256b2c2be2e325567a9ca
-
SHA512
4dd1c6d1ded36652d0cd08f852c7d70de67301682d212083982085dab7d2395ca174f9178ecde209e37756830c6872b89700c105213846e70f4ef08fa106c56a
-
SSDEEP
1536:BH5bgPluEYI4cpoag73CBxFMEci4t2wao9pVg50kjMSMFZuEcHE:BHyM1IFpTYC+Q4t2wv9LhSGuvHE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1060 dfe182517a87fa581c1cbe91177b43c8.exe -
Executes dropped EXE 1 IoCs
pid Process 1060 dfe182517a87fa581c1cbe91177b43c8.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1516 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1516 dfe182517a87fa581c1cbe91177b43c8.exe 1060 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1060 1516 dfe182517a87fa581c1cbe91177b43c8.exe 29 PID 1516 wrote to memory of 1060 1516 dfe182517a87fa581c1cbe91177b43c8.exe 29 PID 1516 wrote to memory of 1060 1516 dfe182517a87fa581c1cbe91177b43c8.exe 29 PID 1516 wrote to memory of 1060 1516 dfe182517a87fa581c1cbe91177b43c8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe"C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exeC:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5ffeb049ea0ffe3e85fe9d1e5461373ea
SHA1c2f6841262632b06958564f93e9896d8f2c8728d
SHA25690788438e54e7b5ec8faf6cc122628c4151b39c521da52f38651e0601616d4ee
SHA51246fe934616ef4be9b7cbd1b55da31bb42d119bc3162297f2535fa3bf522f8e5404efc6837f0160c88c2a85f602efd3be721cba299f4350d16e7498c0cc437ede