Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:09

General

  • Target

    a0239dd383851b82c0eb45099c9e8f266efaac673dab7f9803a6419a4b9199d7.exe

  • Size

    6.0MB

  • MD5

    0d128305979564f4ef4e8d59a613a9b6

  • SHA1

    db5715d3109a83094ef2746c46ec3f985f00394c

  • SHA256

    a0239dd383851b82c0eb45099c9e8f266efaac673dab7f9803a6419a4b9199d7

  • SHA512

    ea368411e0799ba709614c03b5b66dbc48cb580ec67816acb4f443d8e18a0e94c7ffd9b1f77f4f1b3e99ab833d3ff8f7a5e31e05577905a165e88c4b83d4988a

  • SSDEEP

    98304:emhd1UryemiJ+w/ym9B3V7wQqZUha5jtSyZIUS:elGiJ++fB2QbaZtlir

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0239dd383851b82c0eb45099c9e8f266efaac673dab7f9803a6419a4b9199d7.exe
    "C:\Users\Admin\AppData\Local\Temp\a0239dd383851b82c0eb45099c9e8f266efaac673dab7f9803a6419a4b9199d7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\A4D.tmp
      "C:\Users\Admin\AppData\Local\Temp\A4D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a0239dd383851b82c0eb45099c9e8f266efaac673dab7f9803a6419a4b9199d7.exe BBDFBDF17B45D1373609DBD9D4D172D9ACEDCE6C0160783FF8C1CFB0F573A6A783DDAF7D3AF65D3D9363BF8027E34C6F16444E1C267FA368D9D7740BDC1EC663
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\A4D.tmp

    Filesize

    6.0MB

    MD5

    386fb7fd121b9f0fe46b095544ef4d37

    SHA1

    a875993f63b3e92092c1ceba66b649eec2a9eee8

    SHA256

    e00138e49e9257333cd6888ce4545b26655a689aa3f69ecbc8062dd44039a62c

    SHA512

    b93c5a081a3ea1f18b726fabb8c66a8a858ee3029ac2f506c8a5be11bd4c721a05a180a0acdb5cfbc1784209959f6d94af004bb8c2f5d88ad5a94c691688fe29

  • memory/1948-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2616-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB