Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 23:23

General

  • Target

    7a5c17204ed4f375a7704a263b69e5d8c4ad4bba6fb3f286a0ebc49e9db8f58b.exe

  • Size

    74KB

  • MD5

    585c3f8b494aba80b4f8bb0d109a35c9

  • SHA1

    baa30166a0fd2e6f7b96ea64067ecf6bf4f317f4

  • SHA256

    7a5c17204ed4f375a7704a263b69e5d8c4ad4bba6fb3f286a0ebc49e9db8f58b

  • SHA512

    fd44c95d25921d530f1c7bf636f8503779f8044b9d4ecc16a2203c2d7211fe6ffe5a5b7985a11d356ed5d2f89768822c5e517716af0a4dd26e1f53cb1e1c978c

  • SSDEEP

    1536:1YF8NLCofRLCg/pdsHT+obdo8Cgzvl4ooofgke253u2D+1:uF+LCofRLCgxSzXo8CgpIo53u2D+1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a5c17204ed4f375a7704a263b69e5d8c4ad4bba6fb3f286a0ebc49e9db8f58b.exe
    "C:\Users\Admin\AppData\Local\Temp\7a5c17204ed4f375a7704a263b69e5d8c4ad4bba6fb3f286a0ebc49e9db8f58b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:2604
    • C:\Windows\SysWOW64\apgoonog-ced.exe
      "C:\Windows\SysWOW64\apgoonog-ced.exe"
      2⤵
      • Executes dropped EXE
      PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\apgoonog-ced.exe

    Filesize

    71KB

    MD5

    609e82f940b782ab45d12df2492809a7

    SHA1

    53e0d785edde3f4cebbc58e2d506a72722f0aff0

    SHA256

    c2db05e460b61f02dfdf82d83d90ef0b5ffd0fc21f888b106c398544f75e3321

    SHA512

    d587499d045f45d8f994a612e8e44815af0d225aab9b4b0905ed2f70b58aac99d6b2986f4a914c520017ab94cbadb468602226e3021b2559df9dd1821165c4ab

  • memory/2604-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB