Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:52

General

  • Target

    7ea5ff51cbb53c4ef79f4d62166728b3edd2881b48087d4a040e4635ccf6e0b5.exe

  • Size

    79KB

  • MD5

    d4d96742fea78ea0caa83473fda90496

  • SHA1

    5c707303c936b41d5eb4d2f71213d6cb9ae2cf01

  • SHA256

    7ea5ff51cbb53c4ef79f4d62166728b3edd2881b48087d4a040e4635ccf6e0b5

  • SHA512

    07615388d43e66a7434df35f2eb24bd086a388fdf49a6274f644e1d5ff52e43ff14f103aed82b0372df1bec63486c96d31f37b248e3cdd423d4e67db8ce202af

  • SSDEEP

    1536:zv5F8+niQuWw7OQA8AkqUhMb2nuy5wgIP0CSJ+5y1B8GMGlZ5G:zvMEuWwqGdqU7uy5w9WMy1N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ea5ff51cbb53c4ef79f4d62166728b3edd2881b48087d4a040e4635ccf6e0b5.exe
    "C:\Users\Admin\AppData\Local\Temp\7ea5ff51cbb53c4ef79f4d62166728b3edd2881b48087d4a040e4635ccf6e0b5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]
    Filesize

    79KB

    MD5

    f9e2afa3f337dc78a0de0d9fa8f8055a

    SHA1

    6f740049d6f6fd7bc3b97c1b592566e3fc38e38f

    SHA256

    8cd64dc886aa8dea700dc3415c8ad05b55a8e04b7aecfa126ca1ab295f2cd4dd

    SHA512

    33ca82b3e2268beff7da3b78a2e13555f14e3d50f043529d5f4d15807a48728b377cf395aa4fcb121e4eac575ef5fadbdcf9eb53464ef68efccdca064f3e72c2

  • memory/2976-8-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3004-7-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB