Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe
Resource
win10v2004-20240226-en
General
-
Target
ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe
-
Size
194KB
-
MD5
32d98c3da9a2be71c1e2e5b63235e8d3
-
SHA1
fd4a82c384d9f297ab7233c5cb48854ff65d90c6
-
SHA256
ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0
-
SHA512
fdd0451c630958bf350f68c5c4b4f59ea1d01ccd77e954a962c7f4cc62aa76239bc4b32ea0f5e34bfddf51ef5461239556f6c59438772012d2b197bba5603251
-
SSDEEP
3072:VF6LjAO8qoLxZ8HQLFC7IBqP2mgkVwgLTUHy:aAO8LTvBqLLWi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe -
Loads dropped DLL 1 IoCs
pid Process 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2436 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2436 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe 30 PID 2572 wrote to memory of 2436 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe 30 PID 2572 wrote to memory of 2436 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe 30 PID 2572 wrote to memory of 2436 2572 ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe"C:\Users\Admin\AppData\Local\Temp\ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exeC:\Users\Admin\AppData\Local\Temp\ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\ed01297224f438ede9652b1777970917f6e21950b2da3e0cc3a05330433d83d0.exe
Filesize194KB
MD5193682e0adf82fb602c9249b1ea93ef5
SHA1a862476d211f670d230b7d1d0b47f90e9f207ef8
SHA25696c0ebcc9b8c433ba352107951989c1516dcb85385598ad5ef62f3686de9fae9
SHA5121f82bf08e5724eccd9640a9e6dd22970057276bfbdcf761a76a4acf664840a137c1dd3d1cf739b737702b82e14cfb2fda4a7eed0abb9de9882407d9b776d0c45