Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 19:21

General

  • Target

    c7d092a8f60267800e96f5f7950bc0082578f32e113e359300fc20062b5cb87f.exe

  • Size

    816KB

  • MD5

    81355a07c284f124d3a3fb4e2c203100

  • SHA1

    a6279660c769b070defdfed28643fa61062d73ce

  • SHA256

    c7d092a8f60267800e96f5f7950bc0082578f32e113e359300fc20062b5cb87f

  • SHA512

    18d98d8a8097bb248a3f14e4ed6796c84019cdb0ccd95a8cd514e1d45590b0196c0912f7e940ce542f7b897c3997c0fcfb9ed8b73d47c82347904e04153fbc26

  • SSDEEP

    24576:sY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9O:B3XZynV4oDabuWbDQOcIxJJ9O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7d092a8f60267800e96f5f7950bc0082578f32e113e359300fc20062b5cb87f.exe
    "C:\Users\Admin\AppData\Local\Temp\c7d092a8f60267800e96f5f7950bc0082578f32e113e359300fc20062b5cb87f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Local\Temp\1B0B0A0D120F156C155C15F0C0F160F0A160F.exe
      C:\Users\Admin\AppData\Local\Temp\1B0B0A0D120F156C155C15F0C0F160F0A160F.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1B0B0A0D120F156C155C15F0C0F160F0A160F.exe

    Filesize

    816KB

    MD5

    43ca559696ffab70c1bb3442e4666380

    SHA1

    d5cf6fcd51924626a0364d884a476df400bd8849

    SHA256

    335e93dcb1f0a40f2955145e8939023bf72cfde850b9c1e509a4c7a031947dda

    SHA512

    6082feb1e2012f92c52d43bf28f576613c5d80263e6bb84c6fd79a1ec5c8d51e12002703c82697bf5dec9a4558c8cd77933672411b04c68d26826fe9348e5c25

  • memory/2776-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2776-1-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2776-4-0x0000000000401000-0x000000000041F000-memory.dmp

    Filesize

    120KB

  • memory/2776-12-0x0000000001FC0000-0x000000000216D000-memory.dmp

    Filesize

    1.7MB

  • memory/2776-11-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2776-17-0x0000000001FC0000-0x000000000216D000-memory.dmp

    Filesize

    1.7MB

  • memory/2968-14-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2968-16-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2968-15-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB