Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe
Resource
win10v2004-20240508-en
General
-
Target
eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe
-
Size
272KB
-
MD5
0fc2dabd74b8b8ffc7f2433a74dc9ac0
-
SHA1
b6967ec4517d5584e4d39b80209ea4972abd9335
-
SHA256
eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b
-
SHA512
2c143a9ea38cc09afb8a4e1d89784d233a98ed9ba587fb1f0961b55596a73335bf0d1449fd95ec37ff7890de42221b3f8e9dafce21bbf80c68201094cfbda27c
-
SSDEEP
6144:Yx4mo6WULy0Hz29lx6Nt/nfiSKFi6V40saiZ:y4mtrz7R7KFi6VQ5Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe -
Loads dropped DLL 1 IoCs
pid Process 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2820 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2820 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe 29 PID 1792 wrote to memory of 2820 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe 29 PID 1792 wrote to memory of 2820 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe 29 PID 1792 wrote to memory of 2820 1792 eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe"C:\Users\Admin\AppData\Local\Temp\eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exeC:\Users\Admin\AppData\Local\Temp\eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\eabd22e36aa897dc906644fddc7f234fc04c171b7bdb9a10da16a0df7b05622b.exe
Filesize272KB
MD514dd9e0cab91d6a04fc46715977d55e4
SHA1369cfeb5e549af4dba65bc5535553ee03773cf39
SHA2566b375c138550a2d18242c620ca953280ef8a5789a3f6c78da75caf3477f3c605
SHA512e5d3ae770f60039890970e3466f5f98686733d6249b645dd2e0469845e213181278d9ebd38e5d5aa646252571cad7394a267cb201993040b650e779c6651878c