Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
Resource
win10v2004-20240508-en
General
-
Target
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
-
Size
5.4MB
-
MD5
bce4e3991fb5801d380a4ddd003956e2
-
SHA1
5e936e486a6b80ee37491734ed67d84cd23e7334
-
SHA256
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c
-
SHA512
f155f9a7ac8c2bb87fd5f81234f335d8cee32019077424f54280e1ae01d85218b16f002b605de88dc4793d4cc42f8b7c9d0607df197584147de97fd43b7d674f
-
SSDEEP
98304:emhd1UryeDOtmR4f7ixp2IYV7wQqZUha5jtSyZIUh:el/OfGxfY2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
B47.tmppid process 2060 B47.tmp -
Executes dropped EXE 1 IoCs
Processes:
B47.tmppid process 2060 B47.tmp -
Loads dropped DLL 2 IoCs
Processes:
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exepid process 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exedescription pid process target process PID 1964 wrote to memory of 2060 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe B47.tmp PID 1964 wrote to memory of 2060 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe B47.tmp PID 1964 wrote to memory of 2060 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe B47.tmp PID 1964 wrote to memory of 2060 1964 a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe B47.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe"C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\B47.tmp"C:\Users\Admin\AppData\Local\Temp\B47.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe EF76EF2F743E20EC95770E1300387E39C6DC3174C24990559B55EBC1A09457E0EB80216535566BD1E04C1382F65BA9B042E8C80C01057619F4425B62937487C82⤵
- Deletes itself
- Executes dropped EXE
PID:2060
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5099bbfa202a03c6fa803ee3f1c752957
SHA1652d01ff2a5550b994d69022fde60aee14f8cb2c
SHA256b036fd8d5c0c0e98c58e567343417f525e2d102fc23fa46ee1f717a5a4ca73a4
SHA512e60f904ee1cea51eb59198befbbc27296e39bc725e05110f791e21664b662f614dc948ef136a0e8fdc5f65946180c70d49c091fd7bc908b4556e146f036e1a6f