Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe
Resource
win10v2004-20240226-en
General
-
Target
2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe
-
Size
528KB
-
MD5
f1530228f233fe762b163adca61d5694
-
SHA1
23482057fe5a918afa1507442177fdfa5407f9fb
-
SHA256
2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3
-
SHA512
dd4f1f4558b265c58f50d51e873877956d9a4dd8f5012c33e5d3934319942749c774aaa90a5f0134090739eb2474c37faca17740956ae53ad8232e424ef94615
-
SSDEEP
12288:xa6tNuaskuO50npM4dl0v5JHpS0wULVnMhysFje:xRtYA5EM4dmv5Xf+hS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2324 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2324 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2324 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2324 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe 28 PID 2960 wrote to memory of 2324 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe 28 PID 2960 wrote to memory of 2324 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe 28 PID 2960 wrote to memory of 2324 2960 2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe"C:\Users\Admin\AppData\Local\Temp\2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exeC:\Users\Admin\AppData\Local\Temp\2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2324
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\2a745a246fccad8b02934c9398cb7a8972c8929ceaecdba492f9461f75b16ee3.exe
Filesize528KB
MD5a6ecaa4e73fb0aad0917dc578901d496
SHA190cd976aa9fa47bf681ec103b5f9cb291939b96c
SHA25629d6d054aba846480112d65d5cd9944308145b312277e2fbcd93f3e379a86d55
SHA512f3e181bb2bcad9a96a6bf4d3a14d84144c4f79c8931841fcb372c15deefdb3a761b58a48eeac7575dc2d7683d015019a85ad41aa3827a81b08c6829513852fa2