Analysis
-
max time kernel
303s -
max time network
321s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
remote.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
remote.exe
Resource
win10v2004-20240226-en
General
-
Target
remote.exe
-
Size
109.6MB
-
MD5
9ed2ecc69a8d28180ea9b09aca9cc52c
-
SHA1
a76ae731b77c851b570a495d5ef4038642786831
-
SHA256
bea35dfc4b1202c07ba712822e10f69de68c84ee535f376bf7e31601661d668a
-
SHA512
9c389cf86da4c2b304d9f3a964107a3d9e4999735e3d6b8c004ca986858f91a9213851ed855c6bec5f7b5c539afef74694e6f32c5b51f63f357ace538b4bdfaa
-
SSDEEP
1572864:LOwVocpvoNevC2BbuJHGO4sD6592vTvIPQssYZ9Dct8B6MCuTWIZpumprpbsyeqw:FX9otcbuJDc2QYssYr+q6M5Tzl4eWV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1048 remote.tmp -
Loads dropped DLL 1 IoCs
pid Process 2012 remote.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28 PID 2012 wrote to memory of 1048 2012 remote.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\remote.exe"C:\Users\Admin\AppData\Local\Temp\remote.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\is-2RA9O.tmp\remote.tmp"C:\Users\Admin\AppData\Local\Temp\is-2RA9O.tmp\remote.tmp" /SL5="$50154,114004982,786944,C:\Users\Admin\AppData\Local\Temp\remote.exe"2⤵
- Executes dropped EXE
PID:1048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD58db3b20f6738fdf1655b2596bd4dcca5
SHA18f162e8178b28b901863b62d586766e33e87713a
SHA2561644a239a1eb56b42849ea2cf4e75a0710966921fcb84655540d6bca2cb9a9da
SHA5125fdd62d05b44b4954b795e0847ee3b11f4c7da3958f03eccdf0ebe4f1ce6009fe3a50db1c7ed734e9b0f47107789b48876466f4099c9cefc3c87a6cafa5fad26