Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe
Resource
win10v2004-20240226-en
General
-
Target
66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe
-
Size
700KB
-
MD5
25fc2e11b0a48877eae437e1e055344e
-
SHA1
aa541c4a93b060f78d28c9dc6b0b49b849fa7e20
-
SHA256
66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297
-
SHA512
38c5f1bbf387b681488b45dc4d6a08c8eaee24035505796803c59f8e89f5b3c79f7f14556b50a1c0f6daf2616f810eb996d4ed5806b8ef3528082712a809baad
-
SSDEEP
12288:iWBm+95nHfF2mgewFx5vgAggxfbXvPGOdPJfGp1kfgjdkAitv4aHlrc+6LAEOJ4h:iWBz95ndbgfx5vTgGTzNE+gjTitv4aH+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 7243.tmp -
Executes dropped EXE 1 IoCs
pid Process 2488 7243.tmp -
Loads dropped DLL 1 IoCs
pid Process 2380 66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2488 2380 66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe 28 PID 2380 wrote to memory of 2488 2380 66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe 28 PID 2380 wrote to memory of 2488 2380 66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe 28 PID 2380 wrote to memory of 2488 2380 66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe"C:\Users\Admin\AppData\Local\Temp\66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7243.tmp"C:\Users\Admin\AppData\Local\Temp\7243.tmp" --pingC:\Users\Admin\AppData\Local\Temp\66b75c65d2358f56e9dd95e4f0028ec7d2a788a2d6ad05d122e927a16705d297.exe 6095B88EAAAC331086B57119677E55B550F6F5F23018676FF380209822A9F613C5F7B46A561EE9BB6FF04C4F5EE6711575AB458AA3B252C8468DA1508AEFE4C72⤵
- Deletes itself
- Executes dropped EXE
PID:2488
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD5f2960043f35030ce29368be32525e433
SHA1dc4046eb33d0741beffae4f21f2d4240b70d0f9d
SHA2565413085fa620c005d2d641f47e3275647546bb3bb9d520b986b205b693f2fbf1
SHA512068ee94a9ab437ae5257802baaeaa728952e8e76ac06890188dc8b173c7e2d8a89a0e8f391b81a9c9c02353b39a3a69a1b029bc2ea0dfa75458bf4ae5390f2e3