Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
Resource
win10v2004-20240412-en
General
-
Target
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe
-
Size
7.0MB
-
MD5
7dc63389fb7ec3ba530b0bc5070b99b9
-
SHA1
273234f36351a68f8cf16e710962666e47f7ab8e
-
SHA256
8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145
-
SHA512
b12ae0d93b65bad7c86333d3741f36f90d5240a5b1df4d4f86776bc8e6c1b629c94860977ff25a4cb26d49e39390077778de9ff966645c64420360719d802a20
-
SSDEEP
98304:emhd1UryetYPn+4CPmjhEdApV7wQqZUha5jtSyZIUbn:elNYP+T0Edc2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 39E5.tmp -
Executes dropped EXE 1 IoCs
pid Process 2156 39E5.tmp -
Loads dropped DLL 2 IoCs
pid Process 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2156 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 28 PID 3012 wrote to memory of 2156 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 28 PID 3012 wrote to memory of 2156 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 28 PID 3012 wrote to memory of 2156 3012 8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe"C:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\39E5.tmp"C:\Users\Admin\AppData\Local\Temp\39E5.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8abcf570901ef81297e919d7fde98bf9de8a67c1ee2473b1affa3d78f1ef3145.exe A98DAA0B78C37D4BBB8FF635B1F97609C8183A9A61CF30CFF49F271CDCF427978E1E8CACB4CB9905151EAB97AD20475D790B02F61221B38C22874EB4486797FB2⤵
- Deletes itself
- Executes dropped EXE
PID:2156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD56b8be74711b022a07cd2a28bd074d59f
SHA19e5a3fa1052e561005e84c1bb00486d67a2dc917
SHA256acad24d00593377155d3f26c6523c7bcdb3b3ad1be7277a9e24c6bf5e048b568
SHA5125ab56c11bd2d2b2fcdfb987d7dc0f509271a2ac4a8b7ca4d980203731ca1ee21c3dda662b80297727fbb76bda547282a4539d6e303a4723d5cb5402b516768b9