Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 04:58

General

  • Target

    a88781b49c1417603b61df953d3ec4f73ba7c7b0ab5eaff3e67945d0079c8a59.exe

  • Size

    5.4MB

  • MD5

    f66edd881c625e720f6e591f96aa724e

  • SHA1

    f788e81aa4bd55d51daa449dd04ff090d1efd968

  • SHA256

    a88781b49c1417603b61df953d3ec4f73ba7c7b0ab5eaff3e67945d0079c8a59

  • SHA512

    0edc081878987e200928e061526d706389d0de799f2608082e42a0dee35384a54fff2a322fe45f7c75ef2ee57779dd8f527bf8a2c5a636d92aa1123b8098838a

  • SSDEEP

    98304:emhd1UryetySOnCOd5uRV7wQqZUha5jtSyZIUh:elNyXC+y2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a88781b49c1417603b61df953d3ec4f73ba7c7b0ab5eaff3e67945d0079c8a59.exe
    "C:\Users\Admin\AppData\Local\Temp\a88781b49c1417603b61df953d3ec4f73ba7c7b0ab5eaff3e67945d0079c8a59.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\9369.tmp
      "C:\Users\Admin\AppData\Local\Temp\9369.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a88781b49c1417603b61df953d3ec4f73ba7c7b0ab5eaff3e67945d0079c8a59.exe C84D5B6E748BD3C60976F0D91B0909EBF390D236671E40045CA3E49645F5798272247E6C31D93D6B42A74BCE38DB6602F653EC39D5606A7C2CD35E5DE578EC8A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9369.tmp

    Filesize

    5.4MB

    MD5

    8fd4071c6f5a655f743d405541b8b648

    SHA1

    19b15f5af7f9f945a9a7c698b1319571f69c5a66

    SHA256

    dba9f597e50aaccd6ba2bbb5472d4868a1f3082947ee12dc3bc85839225321c4

    SHA512

    43b473badddb1ddc91521903c15fdf25371977d87a52dd24af9e7734764cec595442300385e009ee47d4712578e9672d46a33a8b23fcd4d7f01a2f3be6ec761d

  • memory/2736-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2740-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB