Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 21:08

General

  • Target

    4f71e8098d6eb9004337949607f847daa593582750bfad94d5f1699813d86eb8.exe

  • Size

    79KB

  • MD5

    3f3eb18ca38949af44370ea7a0e0342f

  • SHA1

    f7aba091427f09fd8e76e46d843fdcd69f7f9f4e

  • SHA256

    4f71e8098d6eb9004337949607f847daa593582750bfad94d5f1699813d86eb8

  • SHA512

    79ef0ab9b4ea7f51ff1dbfa72b5131bb983321245bff26eeff2cfcd9cb5551f69db70a873b8e6aac1ae688b9a57dfeb411a30abce6d5bf0c8207d4f3741efc4c

  • SSDEEP

    1536:zvtCL7dPmK9gv/OQA8AkqUhMb2nuy5wgIP0CSJ+5yyB8GMGlZ5G:zvt+uKa2GdqU7uy5w9WMyyN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f71e8098d6eb9004337949607f847daa593582750bfad94d5f1699813d86eb8.exe
    "C:\Users\Admin\AppData\Local\Temp\4f71e8098d6eb9004337949607f847daa593582750bfad94d5f1699813d86eb8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    e6630ce539e62b3e8736ca5f1e1d671c

    SHA1

    594cbf334868ffb74989dabeecce02e95098b087

    SHA256

    836f01883e0e37f6ea48b70fe72e2bfdf690291f9dca542670cc8ec4d4edf758

    SHA512

    c67248a8090292ffcf6dc697a786a5343c40be5f669ced8c50c0cf780e68cf6c2f2f6f1a97eca507e34713ed3fad9dc75835101548fa704e2e287ec5d8219eba

  • memory/2492-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2500-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB