Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:44

General

  • Target

    7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe

  • Size

    73KB

  • MD5

    ac8da94172a8f453ae38f610f2a2b975

  • SHA1

    799607157eeedaed2d1171e2a8ab4297e4aeef3d

  • SHA256

    7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286

  • SHA512

    45369ffcce525db1a1d453323496c2d777dc808bff2629994c59d3c1c17b963fd53e4857ec3f1fb1207a0747362b3d2bb8095095c25a43e1b4c4400dca82ca25

  • SSDEEP

    1536:hbKBnHwK5QPqfhVWbdsmA+RjPFLC+e5hp0ZGUGf2g:hGBHwNPqfcxA+HFshpOg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe
    "C:\Users\Admin\AppData\Local\Temp\7da276be9a72aa942905dee865cdecd8d88a0c8baf4a4443a11d37be2f690286.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c [email protected]
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Local\Temp\[email protected]
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 00.exe
          4⤵
            PID:3028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\[email protected]

      Filesize

      73KB

      MD5

      1febae94c8d4677a9f1cbd4fe121e0ea

      SHA1

      f8e59a09e1de9c9f49eb54b6d4c9ee73f5f0d2bf

      SHA256

      74f2c4d48bc32398bb050c3c912c19ee3d07fa14aaf02d2d01e9849ffc4642e9

      SHA512

      6d79fa9896553c5a19c559e5a05ab0cb36df6a6a2c19166b9f3dd5b3e94fdda88c37ea4a311feec8b6e748bfadc5e447c7fe6e91169a8e0889dd02f85eca0889

    • memory/1732-11-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2860-10-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB