Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe
Resource
win10v2004-20240412-en
General
-
Target
87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe
-
Size
197KB
-
MD5
0e7811a734f4e4d3102e9f084e3a6266
-
SHA1
3376880cf55632d2dc74bb6a5cf7d53464bf9b72
-
SHA256
87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94
-
SHA512
3b9d54488b25d4c807a1494e1408629daac73697b31f972ced2b1d2d025044ebaf5a21a8273150235b546e98fbcebfda20b67c6d3f4092f4c1c4a13a794b3869
-
SSDEEP
6144:JH6qZ5EakZF9CKwmJ0q/a7i4QCyGH6Y6l:JHV5YCK0qoirCyfv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Loads dropped DLL 1 IoCs
pid Process 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2960 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2960 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2960 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe 28 PID 2776 wrote to memory of 2960 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe 28 PID 2776 wrote to memory of 2960 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe 28 PID 2776 wrote to memory of 2960 2776 87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe"C:\Users\Admin\AppData\Local\Temp\87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exeC:\Users\Admin\AppData\Local\Temp\87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\87bf1902cbc2282c22e10f492b25b872e756a4f332b68a725c5e1549b6d36d94.exe
Filesize197KB
MD50b3b57445e19ef67842723c63391e76c
SHA11d3b1e6e2e134a4405cf51c9e258248f42c8ae4c
SHA256317282fe11633188efe6941e4804bb203d9600c31455048683f6e96a64c5eb73
SHA512b7a74351880e23bbe294e25b3776ff00216698c577bb38e2874354fdd6a980de8e08393a079949922c6528c44c6f128f95d80d166bb365c6a0a1eb5b25852d79