Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe
Resource
win10v2004-20240412-en
General
-
Target
8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe
-
Size
960KB
-
MD5
942d6308ca6beaec5034b5d5090b6703
-
SHA1
1dbde725e0bb761786135789d252aa95cf14f66c
-
SHA256
8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807
-
SHA512
7d7c2388d46cc4b98a7029b499b820e53f30534f1ce4fd774210d524000ba3303a1a7b1ab408d3e16a8b755544ed8a90a5704276920b201ef0550380081d79c1
-
SSDEEP
24576:YaOfV5PuoGz0Zyn0JqWCiVLZmN1VUZmw3KNFosgTtE:YaOfV89z0ZywZmXiZmw3KNFosgTS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1320 1056.tmp -
Executes dropped EXE 1 IoCs
pid Process 1320 1056.tmp -
Loads dropped DLL 1 IoCs
pid Process 1796 8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1320 1796 8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe 28 PID 1796 wrote to memory of 1320 1796 8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe 28 PID 1796 wrote to memory of 1320 1796 8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe 28 PID 1796 wrote to memory of 1320 1796 8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe"C:\Users\Admin\AppData\Local\Temp\8130951cb8e84b20db5cf4899ae052da3e1ec4f1477e04c9005f9002fde18807.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\1056.tmp"C:\Users\Admin\AppData\Local\Temp\1056.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD56252e8a0ca8f0decca5deb468c22e3dd
SHA17b8e5c7df04ff305f0c53b39d00d33fe82934c81
SHA256503df666f2b70fba5c17b286b7eab8862cb0507b5b994981234a7ce0d7b6df9f
SHA512c7aa085d1672e4b1b66650e361e70dd01c1d2992aa9178220921f9f1a2aacd17ee8b0526cbc08d19d94066c6944d2dc57bb2d5bea84be333447c278a0925c7f4