Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 19:22

General

  • Target

    329a6ed6e8359a15d11e88b722b01164.exe

  • Size

    41KB

  • MD5

    329a6ed6e8359a15d11e88b722b01164

  • SHA1

    4313712c35449000fc0c137f7a34ef661f9afb65

  • SHA256

    bcdd2a922ee15ffc1acbb0de6e5d0871fd47f19e54f8e50f22605c697cca2930

  • SHA512

    af2c1db3d98cdda0c59187820f220194f3e3256d079c35581edb8f31fb3cf6e4c3b1b19419f6f2f827a10b8ad2d534e7d24f66de5d9b418b55a6f54c278b97f2

  • SSDEEP

    384:cRvJdqOxpqm5LpvmLwtCO/e0Ajj6AH2XWwBOdw65UBsU0BSfcCoIVvuy:ghUK3dIgCSJAvLiBOdP2Bd0Bccsv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329a6ed6e8359a15d11e88b722b01164.exe
    "C:\Users\Admin\AppData\Local\Temp\329a6ed6e8359a15d11e88b722b01164.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\gjxqk.exe
      C:\Users\Admin\AppData\Local\Temp\gjxqk.exe
      2⤵
      • Executes dropped EXE
      PID:2260

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gjxqk.exe

          Filesize

          41KB

          MD5

          ce36a3fb93fba83540345883e747fb63

          SHA1

          9bb6bb214ba09bfd41f45f2467c2b29e67e73f07

          SHA256

          62637b9bc885efece5029b7c5878fd349968156ae617cc7988e7b9df1bc574d3

          SHA512

          0a2f754cfd5b5150a0ef2ab00b9b4664bbb61356336fda2138ffe728256e8cbb42da9dc07ce14e9305ec598f16a147aa5686575cf043b812b38c3dc06e025ffa

        • memory/2260-10-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2732-3-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2732-11-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB