Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe
Resource
win10v2004-20240426-en
General
-
Target
397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe
-
Size
7.6MB
-
MD5
75dc6f94e70c44475de77a3e360ca923
-
SHA1
18068964205285472f7b91c7bf0089a7f6d268da
-
SHA256
397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674
-
SHA512
60ec6ec84e3f157d4f2454b4a09898b5694b9ae99e45850ff7288c4a47d67590a517af689ceafb7979638fabba2c8ae7c8899faf99e500466cd7f21e75a0a9f4
-
SSDEEP
98304:emhd1Urye54zoOJ3cSeV7wQqZUha5jtSyZIUbj:elZtOJM12QbaZtliW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 71F5.tmp -
Executes dropped EXE 1 IoCs
pid Process 2848 71F5.tmp -
Loads dropped DLL 2 IoCs
pid Process 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2848 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 28 PID 2488 wrote to memory of 2848 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 28 PID 2488 wrote to memory of 2848 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 28 PID 2488 wrote to memory of 2848 2488 397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe"C:\Users\Admin\AppData\Local\Temp\397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\71F5.tmp"C:\Users\Admin\AppData\Local\Temp\71F5.tmp" --splashC:\Users\Admin\AppData\Local\Temp\397418c331c3a8de81a600278a384f4b6e4185ea26fe830552279c9f3b264674.exe 11EB616A1D3A12B932748E56CEA9E03BAF7F5B35E4DDC0210B5A471EF234280212BE1CB0D559A07452CAE53D8E63E935266C9EB2D595F23D9D92A4A52F2DD1852⤵
- Deletes itself
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD5ecd395641d67d4d471e723d9eb97cf3b
SHA16e81433a8653a60fb888ca30a7a4d3fbf8c55e7b
SHA256fca2f157207e0333913f842c983c2303ac759473438384f9d4d50c42e0279e9e
SHA5127ff864286875e2cd025d2e252a2b77846e212b67ab8b62a30a94cf27a0737b02dc97cca900772f9977824e01595e2748f6d4795771d29094b83cda563511ef4c