Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 01:56

General

  • Target

    682a2ea9a570e20ead208293725ff2b0.exe

  • Size

    955KB

  • MD5

    682a2ea9a570e20ead208293725ff2b0

  • SHA1

    1767b9747ea7df2b36c3f30da6f74ab0e01a36e5

  • SHA256

    2c1ff8a86c36f584fdad32eb22e205892227753f4a08c355fe55ba55bfa11b59

  • SHA512

    7b924d921cea64dfd118dc59da06705145760168724953545100fdd820fe7c3df0161e33a1a7ffa3a507f6f55ad0853b5769671592425de327d00556e04307ec

  • SSDEEP

    24576:oTEKr+lQNNVOUN5mKnkHz2agLZmX1+RnM3L2N9Y3G3wSK6JE4t6FGerrthf:oTEKr+q4o5iHaasZmF+RnM3L2N9YWgSO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe
    "C:\Users\Admin\AppData\Local\Temp\682a2ea9a570e20ead208293725ff2b0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\16CB.tmp
      "C:\Users\Admin\AppData\Local\Temp\16CB.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\16CB.tmp

    Filesize

    955KB

    MD5

    515c9d9a868bf1091ecc3bf53ca856da

    SHA1

    87930be7b40ed752909a1a5425d4982f00b5a5ef

    SHA256

    9e309ed58e439b87c6f1c79de3bb14e23d99c83e1c10096bb21d6fd2a5254fc0

    SHA512

    e5d0cc54fe126fda29629d753f141f684735b3657c2cb1dba7ae3d43a2cc2914cd3de4dfad7f1da1f54766b422c999f293ce486f12e67fe842d1a16f56080cf9