Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:08

General

  • Target

    81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe

  • Size

    79KB

  • MD5

    300f009d842ab0aead365e7a385b309f

  • SHA1

    8ed03d64c5c37c2ed9c2bd5a9633607642f7154f

  • SHA256

    81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3

  • SHA512

    b6cdde2fb6c854e6489d7f2557ae1714a8b287ee342438b7543f38410273cf3a38b2be57659e01628ddb4a5ce0f61cf1451442bd9d3776387478f16c29ce1c79

  • SSDEEP

    1536:zvDsKQrhOuesLDz2OQA8AkqUhMb2nuy5wgIP0CSJ+5yNB8GMGlZ5G:zv1QBLfTGdqU7uy5w9WMyNN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe
    "C:\Users\Admin\AppData\Local\Temp\81d58cbcd28969eb9b27608c878b80e64b2e0c142bb89e879f3b2c53aeb66fb3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    b26d2b8aec3638208a1a98365eec71d6

    SHA1

    3e40a24d73eb9bbaefaeb4d6e6b3c90d2b272f55

    SHA256

    97e30ed712b60cbf169dfbbdc4b5da5d85b13fe980da27a8187f5fdb10218343

    SHA512

    a309795d81eb641084fbf3cad34d3154c19821ea9be7a771bc8e99209225759b9305f0543e14d5753659e2e8c8ef345bb924b27aa712640626f16fec524f9b59

  • memory/1496-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2820-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB