Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
dfe46b20f14845d0744977d937d912e7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dfe46b20f14845d0744977d937d912e7.exe
Resource
win10v2004-20231215-en
General
-
Target
dfe46b20f14845d0744977d937d912e7.exe
-
Size
82KB
-
MD5
dfe46b20f14845d0744977d937d912e7
-
SHA1
cfb7d8d145e54fc02fc1c25d816061c0093b7982
-
SHA256
52c7326a6a38f0faca74af8756ae55e9ab3bed66df332b8251c04b8d672a78b2
-
SHA512
1b151139217fb8c8d979f8cd3014bf9ccef40befb51e979eb05ba9037df353daafe6b83308e12a08e554c943c547d21cdff0a5287f783cc63ba0bd20c992d609
-
SSDEEP
1536:UJO0UxpYyQgBVA9QD0PjPCMXFoc+/09TbQx/Yx8vEH79OT3W1tXYy5hlY:WWxOiB+QaC3T/kTbgAyvEb4eXYy6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 dfe46b20f14845d0744977d937d912e7.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 dfe46b20f14845d0744977d937d912e7.exe -
Loads dropped DLL 1 IoCs
pid Process 2848 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2848 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2848 dfe46b20f14845d0744977d937d912e7.exe 2316 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2316 2848 dfe46b20f14845d0744977d937d912e7.exe 29 PID 2848 wrote to memory of 2316 2848 dfe46b20f14845d0744977d937d912e7.exe 29 PID 2848 wrote to memory of 2316 2848 dfe46b20f14845d0744977d937d912e7.exe 29 PID 2848 wrote to memory of 2316 2848 dfe46b20f14845d0744977d937d912e7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe"C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exeC:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5208fe6bbb9ace8872ea5ba1187c5e03f
SHA12509c21a15f968c6e207b0c70b9704599dd06ed7
SHA256bb7dfdbaee599766a6520aa32ac4fbf91d7d60451b1d4b5dca3dc3d2cc4a81fc
SHA512b4d1a01bb02b5743176035aaf9967a6f390e8db6b3ae676f3368e9587c9ad31c783852d7cd9ecfadc84c47f65e982387233fa1753ae56054ffb5c8fded1dd9d4