Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:10

General

  • Target

    a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe

  • Size

    5.4MB

  • MD5

    bce4e3991fb5801d380a4ddd003956e2

  • SHA1

    5e936e486a6b80ee37491734ed67d84cd23e7334

  • SHA256

    a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c

  • SHA512

    f155f9a7ac8c2bb87fd5f81234f335d8cee32019077424f54280e1ae01d85218b16f002b605de88dc4793d4cc42f8b7c9d0607df197584147de97fd43b7d674f

  • SSDEEP

    98304:emhd1UryeDOtmR4f7ixp2IYV7wQqZUha5jtSyZIUh:el/OfGxfY2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe
    "C:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\B47.tmp
      "C:\Users\Admin\AppData\Local\Temp\B47.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a0eaa5cc16d2fecc797e0b15791e84116006195198f7e8867405715a8c1c932c.exe EF76EF2F743E20EC95770E1300387E39C6DC3174C24990559B55EBC1A09457E0EB80216535566BD1E04C1382F65BA9B042E8C80C01057619F4425B62937487C8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\B47.tmp

    Filesize

    5.4MB

    MD5

    099bbfa202a03c6fa803ee3f1c752957

    SHA1

    652d01ff2a5550b994d69022fde60aee14f8cb2c

    SHA256

    b036fd8d5c0c0e98c58e567343417f525e2d102fc23fa46ee1f717a5a4ca73a4

    SHA512

    e60f904ee1cea51eb59198befbbc27296e39bc725e05110f791e21664b662f614dc948ef136a0e8fdc5f65946180c70d49c091fd7bc908b4556e146f036e1a6f

  • memory/1964-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2060-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB