Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:22

General

  • Target

    3512280f296dd91e5f227d08301e288f02e4b482660c7ba0b4895f1480772e09.exe

  • Size

    79KB

  • MD5

    15e824fcde53ab6bb4508cb73c4cf34b

  • SHA1

    2f043c5ad891180917f70357aa47baee4d311c01

  • SHA256

    3512280f296dd91e5f227d08301e288f02e4b482660c7ba0b4895f1480772e09

  • SHA512

    1891de1b8a59307e198b3b88d8901c31371e451630b08d75472670a510e355ab1feb604cff12432d943285a065717807ea14bb39a6d0f13cd44a83e8204a5d82

  • SSDEEP

    1536:zvgM2E1o/OQA8AkqUhMb2nuy5wgIP0CSJ+5yVB8GMGlZ5G:zvgMa2GdqU7uy5w9WMyVN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3512280f296dd91e5f227d08301e288f02e4b482660c7ba0b4895f1480772e09.exe
    "C:\Users\Admin\AppData\Local\Temp\3512280f296dd91e5f227d08301e288f02e4b482660c7ba0b4895f1480772e09.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    4c40000015608f99442c799c4fc0865e

    SHA1

    449595efd38b6879062ceb54a746921faa89eb3d

    SHA256

    c33fa814c487e087ebc3ea9615676c1aaf22236c5dd6f5416fd7edde978c75a5

    SHA512

    e3bec41a62fe7c2e99c45dc5ee9c27b93a83496ca36c79ed3ed5a9e9e140afad57fd911526ff5e553465aa234223bdca88ef981415608261fd2782e0724eb788

  • memory/1708-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB