Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe
Resource
win10v2004-20240412-en
General
-
Target
f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe
-
Size
915KB
-
MD5
8529d1631815e197d7b0d9bbc9165a99
-
SHA1
1bd41742f94cab139bb0c5e30639fbe777e1e305
-
SHA256
f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df
-
SHA512
366d575f69ca0f2fcd08bfbd5a0e14ea7c460301e78dffc471c48e87ba7681598471b7dc9279338f50382b9dc4266b431002fcc74b3d509f96937918ffa6cdd8
-
SSDEEP
12288:2aS9lwOz8p2+DtxQckVw0qQpeByyRHfSfmKieKMKJLZmZ1IKJUZmt:2aPKEiVwjrHanTyLZmZ1VUZmt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1908 140D.tmp -
Executes dropped EXE 1 IoCs
pid Process 1908 140D.tmp -
Loads dropped DLL 1 IoCs
pid Process 1656 f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1908 1656 f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe 28 PID 1656 wrote to memory of 1908 1656 f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe 28 PID 1656 wrote to memory of 1908 1656 f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe 28 PID 1656 wrote to memory of 1908 1656 f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe"C:\Users\Admin\AppData\Local\Temp\f4683e02c1562a03a04987afa43f4737b22cf6c2ef9bb496df8c4ea2341131df.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:1908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
915KB
MD5a147f09a66512b75597ccabcc67af0d5
SHA1da84d62d89a218852d3588c574d96def259a1a14
SHA256361ad7510d3364b922572df2ca1163d0990a99d5396f8df6d15db352204a56e3
SHA512291dc4237019cf6130257e9e49186cc2e98731343101113f9425d7f879b0d81ac9a92783390c7e46307840e30190fae1fd1dafbf8037dd61a3a19fdcceefee09