Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe
Resource
win10v2004-20231215-en
General
-
Target
8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe
-
Size
256KB
-
MD5
5f061c8ad6e7a6b03d91ec1fa864679a
-
SHA1
b7ae1f791a85461eed72a39d8dbf4c0cda0968b7
-
SHA256
8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557
-
SHA512
36d286eaab3c4925e809d05b99e5031243b1a302436c1df5df5ca1a094e9857730e0acd0b6eac03e6453a36c318b961c6a733d89c73e79f417e72fdd429789b5
-
SSDEEP
6144:CFDRRjfSaDeg80qXSUCh6jTFRbf0eN0W7cyqCxSn1:CpfUXSUCh6XFRbf0ez0n1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2524 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2524 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2524 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe 28 PID 2200 wrote to memory of 2524 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe 28 PID 2200 wrote to memory of 2524 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe 28 PID 2200 wrote to memory of 2524 2200 8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe"C:\Users\Admin\AppData\Local\Temp\8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exeC:\Users\Admin\AppData\Local\Temp\8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2524
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\8077cccc46c5c8f48721da6e8dba50a54c776684ad1d9929367ddc1cfd143557.exe
Filesize256KB
MD5be1ea3d6e8cd63f87fdbe947b5e9baf1
SHA189fb250d9cd4fbb35a736595d7c18974468eaf39
SHA256a1e645f0ac65c5f766611a7a598bff51cfb0b246370bc763355bb1a83a26e120
SHA512231bf95672db02184e7a3231c14a61e679c5ce38ad60fe1c8007b7d8dcb18ddff1dbabae936385971115f6e0ade51bb038de046ff1a416f14e8189adad2528b9