Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe
Resource
win10v2004-20240226-en
General
-
Target
dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe
-
Size
893KB
-
MD5
c2d4b26ae398a5ebaf38c866687645c3
-
SHA1
fb36d2d7bcd5509736cfe0ffc8b379fc566e5b3a
-
SHA256
dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d
-
SHA512
36de543986c98b88ba9084bd16ec05b5c2558baa4df84e99ebbe43cd7581c67fd8cca585e4baa86f6a2758299da8c72e9460a11f3afe2c14db336d5421f5b419
-
SSDEEP
24576:1WBz95ndbgfx5cQLpApZ8gjTE5WBGKkWBz95nvBz95ndb:1m95nZgfxLAtjTE5jKkm95nl95nZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 6DC1.tmp -
Executes dropped EXE 1 IoCs
pid Process 3052 6DC1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2612 dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3052 2612 dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe 28 PID 2612 wrote to memory of 3052 2612 dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe 28 PID 2612 wrote to memory of 3052 2612 dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe 28 PID 2612 wrote to memory of 3052 2612 dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe"C:\Users\Admin\AppData\Local\Temp\dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\6DC1.tmp"C:\Users\Admin\AppData\Local\Temp\6DC1.tmp" --pingC:\Users\Admin\AppData\Local\Temp\dad90dfaad0567c4ee7bea5ea6ac18a35a299262437e9258c5737eb2d5adc69d.exe 8DEF78715EBA7F0EBC4B66F8A1E0F43122ECFEF10B086B80B2171C5682A51A09C3F924CCED2025A96DAD654F640B8D493E2D71D602B785ADB9D7C60AA741CE0E2⤵
- Deletes itself
- Executes dropped EXE
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD5afa3d000f6de2bd650ebf053038471c4
SHA1324962dc434ddc292d4ca3f6156be8919386b0a0
SHA25660e66cc9268d0e99b4b1abb29a2e3ba44008eda492c2a5309da6c8ebfa7328a8
SHA5123d00cfea7aeb3be75a8ed0bec540a4b6fadca51289971599406e2981c60ff4164235625e5e9804077240c98ae9b62e676a92bb30edd770d197be6d73a3691a30