Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 00:15

General

  • Target

    8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe

  • Size

    960KB

  • MD5

    942d6308ca6beaec5034b5d5090b6703

  • SHA1

    1dbde725e0bb761786135789d252aa95cf14f66c

  • SHA256

    8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807

  • SHA512

    7d7c2388d46cc4b98a7029b499b820e53f30534f1ce4fd774210d524000ba3303a1a7b1ab408d3e16a8b755544ed8a90a5704276920b201ef0550380081d79c1

  • SSDEEP

    24576:YaOfV5PuoGz0Zyn0JqWCiVLZmN1VUZmw3KNFosgTtE:YaOfV89z0ZywZmXiZmw3KNFosgTS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe
    "C:\Users\Admin\AppData\Local\Temp\8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\1056.tmp
      "C:\Users\Admin\AppData\Local\Temp\1056.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1056.tmp

    Filesize

    960KB

    MD5

    6252e8a0ca8f0decca5deb468c22e3dd

    SHA1

    7b8e5c7df04ff305f0c53b39d00d33fe82934c81

    SHA256

    503df666f2b70fba5c17b286b7eab8862cb0507b5b994981234a7ce0d7b6df9f

    SHA512

    c7aa085d1672e4b1b66650e361e70dd01c1d2992aa9178220921f9f1a2aacd17ee8b0526cbc08d19d94066c6944d2dc57bb2d5bea84be333447c278a0925c7f4