Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:56

General

  • Target

    86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe

  • Size

    384KB

  • MD5

    237b31c197ad4163747d5d6047c6f9d7

  • SHA1

    b6a76b5225cfe4e55735addde92482f6b1c16e96

  • SHA256

    86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4

  • SHA512

    fd005f3cb1574a1aecd1f5f960abff733d96da71345f0ed83131c6249ea4cf5021b1d3b7ab4b6da2ab3e16f3f7b9b970f3ff7256bac3d5b26df2662512385429

  • SSDEEP

    12288:onRDKO3UxUTfS7XThkndHVFRM5IP6VQ5zCD4V3:oiUTfS7XThkn9VXMSP6VQ5zY41

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
    "C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
      C:\Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\86f33037daefd560df2d5d97dfda8c8ed722f4bc1916159eba17b72742c995f4.exe

    Filesize

    384KB

    MD5

    d0e5019b06a907601b017607c9b8d331

    SHA1

    4cb4f268a770ab32f5200d5727402bf66ac4f654

    SHA256

    7f24039a2f32f122462d6c0b75bde0a51fae27687aaadeb5e1b17fe165235a90

    SHA512

    e42a5ccff3011b372e5e3f89988e19be0025b1fd7cfe4c8c6b0f63f3d911169747559b557ab4d8f175a04a8f2bcb883750c9b0438aaae63c4cb7d212dddaf321

  • memory/2916-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2916-8-0x0000000000130000-0x0000000000171000-memory.dmp

    Filesize

    260KB

  • memory/2916-9-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2968-11-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2968-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2968-17-0x0000000000130000-0x0000000000171000-memory.dmp

    Filesize

    260KB