Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 21:18

General

  • Target

    4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe

  • Size

    79KB

  • MD5

    3a68a8a114014f0db88ddd51dd4aa01d

  • SHA1

    f015f647472044ba1aee968b6dfcf4d280e3014e

  • SHA256

    4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4

  • SHA512

    09d9998bc42574bd469f959316dcbf8e67f3a96fb7a0ecc9e29b545cff26a492b87b57397ffba83f0fd36b3b868240ec8e9dd0320f61d0817b4e86e74d5ce3aa

  • SSDEEP

    1536:zv/kDzjjSOQA8AkqUhMb2nuy5wgIP0CSJ+5yHBB8GMGlZ5G:zvsbGdqU7uy5w9WMyhN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe
    "C:\Users\Admin\AppData\Local\Temp\4e4a0bb3b87573ea6bf778637c2d39470042673ad3aa7f6b7b89eb2df5668de4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    0afdb37be14826c25d34727cc8495e11

    SHA1

    5e2b8d8f7a1cf30a06fcae7b40e9e744c4548a0b

    SHA256

    ae706b527ea28664ac48fd74415804d38b8938d182003094f6bc8b236dab6a9e

    SHA512

    a7630b5372696c9a6c04c53af27f8a21f597f3c98073c47389fcc2519484e7720fcfc5a15bd636167b683ec5a36116e2b13192d78f21e0201cdccdcee3106aa4

  • memory/1276-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2760-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB