Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 06:14

General

  • Target

    f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe

  • Size

    915KB

  • MD5

    8529d1631815e197d7b0d9bbc9165a99

  • SHA1

    1bd41742f94cab139bb0c5e30639fbe777e1e305

  • SHA256

    f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df

  • SHA512

    366d575f69ca0f2fcd08bfbd5a0e14ea7c460301e78dffc471c48e87ba7681598471b7dc9279338f50382b9dc4266b431002fcc74b3d509f96937918ffa6cdd8

  • SSDEEP

    12288:2aS9lwOz8p2+DtxQckVw0qQpeByyRHfSfmKieKMKJLZmZ1IKJUZmt:2aPKEiVwjrHanTyLZmZ1VUZmt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe
    "C:\Users\Admin\AppData\Local\Temp\f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\140D.tmp
      "C:\Users\Admin\AppData\Local\Temp\140D.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\140D.tmp

    Filesize

    915KB

    MD5

    a147f09a66512b75597ccabcc67af0d5

    SHA1

    da84d62d89a218852d3588c574d96def259a1a14

    SHA256

    361ad7510d3364b922572df2ca1163d0990a99d5396f8df6d15db352204a56e3

    SHA512

    291dc4237019cf6130257e9e49186cc2e98731343101113f9425d7f879b0d81ac9a92783390c7e46307840e30190fae1fd1dafbf8037dd61a3a19fdcceefee09