Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe
Resource
win10v2004-20240419-en
General
-
Target
8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe
-
Size
203KB
-
MD5
8e7ad39c2dffd90ec1193ee872d58c46
-
SHA1
1cd52032761a1d6fa7949931cbfec578e057003d
-
SHA256
8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0
-
SHA512
2a7f582abdddef99e70164bb7f8359df7a25c1fc8efb63567215884d5104e354f2c56af8db2470cde76d170f0d1574f5f8eb54be3ce56492cb78009cbfca8898
-
SSDEEP
6144:kG8HIAvFc2R6h9QJRnENc0UQnd6gsX2EusZ:kG8HIANc2R6h9QJVENc0igsX2fg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2316 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2316 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe 28 PID 2368 wrote to memory of 2316 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe 28 PID 2368 wrote to memory of 2316 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe 28 PID 2368 wrote to memory of 2316 2368 8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe"C:\Users\Admin\AppData\Local\Temp\8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exeC:\Users\Admin\AppData\Local\Temp\8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8fb7ada83f8c48c1cc6a111d087c8573565bea8164faafade015093e77593fd0.exe
Filesize203KB
MD55ead780d5a78273be34f3d2cf28f705a
SHA11069f41f97de720626cc0ba847967dd03f7dfadf
SHA2569800fc9a749add19b4e7d98902a4fb02d7a4d8a1d5458b7780956161309711c4
SHA51256832f9b5e0f41de0f9c1918d3a36bfd7351a125c491a2f20cbd0af7b3f7f31176c2d8f0f1aa7b9165f88704b366bac026f531c7713bab62b898a806690c7316