Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:46

General

  • Target

    9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe

  • Size

    79KB

  • MD5

    03fa3345a0d6c728787c9ccd5298cf7f

  • SHA1

    be5064cfd8fa5b90f7a995db598e232a6c0360e9

  • SHA256

    9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e

  • SHA512

    68a49c5ab631881bdc2a3ff91175ebb1fd6062b8a8532679e73f8ff928b2e85b55264ae61a72bf0a609b58dcced63c12daeb93b0cd50bf4f420cfb4af647d036

  • SSDEEP

    1536:zvGqEadLracOQA8AkqUhMb2nuy5wgIP0CSJ+5y2B8GMGlZ5G:zvG8EGdqU7uy5w9WMy2N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe
    "C:\Users\Admin\AppData\Local\Temp\9508d2198db6b149cdc1cbd9ffdca26c0aaa73e44364c2466cf63ae548dffb4e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    f83907ea3387035448cde0accf79aa86

    SHA1

    fdff648e6b78bffadb1c81d321cd50247e134f19

    SHA256

    9caae2daa20b497279fe249579c52b8c326290ab5160676fa7936b2c6627c843

    SHA512

    2a41cb282ac6a8b89d99c66dea0f82790088f0d1c4e4c1d987ede07dc69a7f3005500a3d8075b4321a1e2679744507516b6730832666f46341efbd9d77171ae3

  • memory/1008-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2372-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB