Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe
Resource
win10v2004-20240419-en
General
-
Target
a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe
-
Size
448KB
-
MD5
1118e864fbeb84c7552454038298d464
-
SHA1
2830a44ca488ee722d3022130da772a84777ab42
-
SHA256
a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090
-
SHA512
4cee69dfcb5a6f6fc358f54562af2a5e426f0fa3bb5cc65f3f0c9e97a2531a40acccc293c42fa5573f8c14b8a1bd4572e2b6aa84fa8f9fd5a517e3e91bac432a
-
SSDEEP
6144:3FrJxvldL4c5ONK1tgRbd1s79+i5+Sd/p+LZ5IXsgerVlIGp5QfZP9tH3IBtoEu/:lb4bBxdi79L6Lyh6lPQh9xIBtoEKIa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 1239.tmp -
Executes dropped EXE 1 IoCs
pid Process 2936 1239.tmp -
Loads dropped DLL 1 IoCs
pid Process 1888 a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2936 1888 a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe 28 PID 1888 wrote to memory of 2936 1888 a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe 28 PID 1888 wrote to memory of 2936 1888 a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe 28 PID 1888 wrote to memory of 2936 1888 a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe"C:\Users\Admin\AppData\Local\Temp\a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp" --helpC:\Users\Admin\AppData\Local\Temp\a97777c9aa1c7c07342b7a0a5b351c01d4908b88ecfa8dd4af6c56d668b3e090.exe 4B68FBAB145D01DA238FE7AC7F22F15BD4A2DB37DE41072046C8F6A2E86EC3FD5FBE9FEE52634DD069BDDF0018674216E97406EB40C2564B0B28427FF17A761F2⤵
- Deletes itself
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5f2e99893467a006d686b28131237e9b4
SHA11746fbe35e0da1d8411f5fee9f7e5afa5005b8aa
SHA25617bf93a4116ad9d335181b150dbe48b855533e049ac8e477a86ef2882e3163c4
SHA51277b44b5b56ebbea910636ece6727fce0c2e4757537f2ea31733e947e2c143daf3c0f125a612ca5b01f9eb707daf660c0df6fb5d81391f241e5ddc4046a9c33ce