Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:00
Behavioral task
behavioral1
Sample
225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe
Resource
win10v2004-20240419-en
General
-
Target
225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe
-
Size
7.3MB
-
MD5
127e33cd08a5724cd7bd7dc4f46a1841
-
SHA1
a0714754df75daced14a9a01d6d3e1e840e4a809
-
SHA256
225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
-
SHA512
24d88403399a1a03e60a3aa30978c05f997e724aeffa66a3856660732bb834869c82696363bf87190a9ed53ff25fdee4b9bf49d4a5deda4ba528d737f42446a9
-
SSDEEP
196608:4lRSxbAQ5owejuJDUX47dwdW0LBOTnPHh8Fp+:/xCaUX47d4sy3+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1680 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1680 2088 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe 28 PID 2088 wrote to memory of 1680 2088 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe 28 PID 2088 wrote to memory of 1680 2088 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe"C:\Users\Admin\AppData\Local\Temp\225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe"C:\Users\Admin\AppData\Local\Temp\225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4