Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe
Resource
win10v2004-20240508-en
General
-
Target
727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe
-
Size
425KB
-
MD5
8cd12dbaea27a1ee9c0290c65da8decc
-
SHA1
d4ee353a8bdab1a85fee9bc38c78a66e6ced7579
-
SHA256
727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8
-
SHA512
fbbf885724a0d5cbedbe164d194564ba9f6f11ceba3127404d745974b53007ed4957d0767fd1f78fb8ab420616878cb963dfb3540eb8d5d0f6c87d8e37f5c9f9
-
SSDEEP
12288:mOndPNmtg9tVWc1+Lj1f1C+ffZMcQUZn2qhg2kD44zzrGEPVQ:mOnd8tAtVWc1+Lj1f1C+ffZMcQUZn2qv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1256 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Executes dropped EXE 1 IoCs
pid Process 1256 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1256 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1256 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe 28 PID 2228 wrote to memory of 1256 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe 28 PID 2228 wrote to memory of 1256 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe 28 PID 2228 wrote to memory of 1256 2228 727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe"C:\Users\Admin\AppData\Local\Temp\727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exeC:\Users\Admin\AppData\Local\Temp\727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1256
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\727b8c35708cae6e9bd5b2c99dd8874ced19cf7156ccd87c3349760ecea8f7c8.exe
Filesize425KB
MD5292266059f6dda3d06bbd3ad5a9c4ee1
SHA1f24f391f7b7a7d3c253deb2193d13e1369f3d869
SHA256c9b68a1cef1bf13e69de3503715e257e8467c1db660ab78a689f63e7e184245e
SHA5121dda6ea7ad271c46878e4e49a61fb6b6fc236e649df05b351911b10eea7834c18af6b40ad0272616caae9d2427351b4dfd78b3aae2f3738dce8674c479408531