Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 18:12

General

  • Target

    062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe

  • Size

    79KB

  • MD5

    585d51545c61cb84ecfb4cb52d98cb38

  • SHA1

    d1a534f24e34ecf7f3948c89e883deec1dc65b21

  • SHA256

    062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810

  • SHA512

    dc091bb47290b6ae7f9267138dced85977ea0844de11debb69d6bd328464a9239dcd7d173ca4d280ddd1a7ca532445881b7c226108067a85470132984df01f33

  • SSDEEP

    1536:zvQsuJ0L7bX+xwbNja0OQA8AkqUhMb2nuy5wgIP0CSJ+5ygB8GMGlZ5G:zvI0L7bX++bxaxGdqU7uy5w9WMygN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe
    "C:\Users\Admin\AppData\Local\Temp\062603eb9b1e6fc2e95437754bf5849fee3bf04e95808483e48bbb2405e49810.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    73ce19b332b08595f52172a8dad61481

    SHA1

    7b89b26acc6f1cb5ff09c6c694aea3f7b9e41b6e

    SHA256

    5dad95034f3074b13a7334b859c964516626ea23d7b7623a63590ff35f8bc2e7

    SHA512

    230de40d8dfa0bd5241fe16de88c5cb44927144058bda37e4ef9750e984d4e42a109df2fc98cee8539ab1b6d4be776931042fb2bb231b5430d8d14634aaf6d9f

  • memory/1044-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3040-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB