Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
Resource
win10v2004-20240226-en
General
-
Target
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
-
Size
411KB
-
MD5
33cda9b3a2d620bcef5a01024a5a872c
-
SHA1
a3335ff5a36efdfcb92e769b12563dd75869682f
-
SHA256
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8
-
SHA512
d7e8c1adc60c77dd75fcc907362ee6672bfe3617f971d69b1709e980a4e16111bf03998c63e21c89e30249c99212b1097824b73e82125758361aae19c0b7a306
-
SSDEEP
12288:gZLolhNVyEdHfS5BPxmLYFdEJpjjslqHI:gZqhOERfyXmyEJpjjsR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 1989.tmp -
Executes dropped EXE 1 IoCs
pid Process 2108 1989.tmp -
Loads dropped DLL 1 IoCs
pid Process 2372 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2108 2372 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 28 PID 2372 wrote to memory of 2108 2372 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 28 PID 2372 wrote to memory of 2108 2372 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 28 PID 2372 wrote to memory of 2108 2372 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe"C:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\1989.tmp"C:\Users\Admin\AppData\Local\Temp\1989.tmp" --pingC:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 2B23E9F9902E20F026E59CBE50737485438F8E83493F84B1C5C161241A618301E516DCDC2FCF48EF4F266BC7681CAF01E12F0A83ED6EE91AE60A440B8406CD5B2⤵
- Deletes itself
- Executes dropped EXE
PID:2108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5e0608ac49565ec021748f04c623073e6
SHA1dbb74d990d654cd5e837b5c1319a9156489b9565
SHA2569b19e260594d82421d573c82b35622880b553ad7483ba314d13f2fb58b229284
SHA5129ae537d9eb2216199392bf43e91325f382c4d30410b9f14d1b27c587698a69d6c66e0304fff1ea3ed7ef50220685f77535006030472a6092279a167cf93fb9e6