Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe
Resource
win10v2004-20240508-en
General
-
Target
0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe
-
Size
6.0MB
-
MD5
08d6349a7d530bdda26ad49f3ff9aeb4
-
SHA1
1bf9051b21b7cef2ffbc14177ece6fb78f382ee0
-
SHA256
0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4
-
SHA512
ebf358d0fc4f0af52895ecde84cba4c91cceede5c4c3cec08c470724d6d73de2c77051791b4778d6cf568f6c84f8df32ab95f6fbc69614fbd8a549d631b615c7
-
SSDEEP
98304:emhd1UryeQNLOhp+vXV7wQqZUha5jtSyZIUS:elw9gAX2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 9A2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2676 9A2.tmp -
Loads dropped DLL 2 IoCs
pid Process 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2676 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 28 PID 2248 wrote to memory of 2676 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 28 PID 2248 wrote to memory of 2676 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 28 PID 2248 wrote to memory of 2676 2248 0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe"C:\Users\Admin\AppData\Local\Temp\0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\9A2.tmp"C:\Users\Admin\AppData\Local\Temp\9A2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0e5af6907bb7c80ff805023d18382899abe01387d769abcee439e0169f33a8c4.exe 26FD64F2BD4E12B8B0004FC7E7C5E018D7B27DE0B5B73F1E3EAD9EE3BB3DD7967E403D05B9E920A042DF02B7DA876DFE8E439B1941AAD1D1676B7BA2A0F6638F2⤵
- Deletes itself
- Executes dropped EXE
PID:2676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD57d966569b5e9e6772672c19d0a988f73
SHA19200e573d2542ffd227c5ed0a54746d67bd1f709
SHA2568b55b13a071f0462d6538fcc03b6cb93180bd06376a8ef86bf716ee8cd566f13
SHA512fd99f938803ece90ada61eb851c07bf71ac8031402853a24017731a4840a384cd9d523d028e41b3b97c31ab0088300d24d9909e389c8d322f5e396d68415863f