Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
Resource
win10v2004-20240426-en
General
-
Target
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
-
Size
384KB
-
MD5
237b31c197ad4163747d5d6047c6f9d7
-
SHA1
b6a76b5225cfe4e55735addde92482f6b1c16e96
-
SHA256
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4
-
SHA512
fd005f3cb1574a1aecd1f5f960abff733d96da71345f0ed83131c6249ea4cf5021b1d3b7ab4b6da2ab3e16f3f7b9b970f3ff7256bac3d5b26df2662512385429
-
SSDEEP
12288:onRDKO3UxUTfS7XThkndHVFRM5IP6VQ5zCD4V3:oiUTfS7XThkn9VXMSP6VQ5zY41
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exepid process 2968 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe -
Executes dropped EXE 1 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exepid process 2968 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe -
Loads dropped DLL 1 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exepid process 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exepid process 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exepid process 2968 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exedescription pid process target process PID 2916 wrote to memory of 2968 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe PID 2916 wrote to memory of 2968 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe PID 2916 wrote to memory of 2968 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe PID 2916 wrote to memory of 2968 2916 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe 86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe"C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exeC:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
Filesize384KB
MD5d0e5019b06a907601b017607c9b8d331
SHA14cb4f268a770ab32f5200d5727402bf66ac4f654
SHA2567f24039a2f32f122462d6c0b75bde0a51fae27687aaadeb5e1b17fe165235a90
SHA512e42a5ccff3011b372e5e3f89988e19be0025b1fd7cfe4c8c6b0f63f3d911169747559b557ab4d8f175a04a8f2bcb883750c9b0438aaae63c4cb7d212dddaf321