Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe
Resource
win10v2004-20240508-en
General
-
Target
8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe
-
Size
5.4MB
-
MD5
44eeadaf8bc7cdf9a81e99eab3c61ce5
-
SHA1
b481e447f291603126cc0808e960bff71ed0484f
-
SHA256
8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095
-
SHA512
68bf01dffe6ed82e34f0b3b5e352ecfe5a56bbf5c65a4ce04e3282f0d1385c9ac190dffcbffba1b4da530300ee8222b87725523a6ebce2361406d0e709e7a875
-
SSDEEP
49152:Svm2AC0d1XqrdryeJVijBkXEDDXabDMhK2NEVwLVT5dVXeQqZUhh4r5VC9PI+KtN:emhd1UryeCqUhhV7wQqZUha5jtSyZIUh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 9398.tmp -
Executes dropped EXE 1 IoCs
pid Process 2940 9398.tmp -
Loads dropped DLL 2 IoCs
pid Process 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2940 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 28 PID 2724 wrote to memory of 2940 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 28 PID 2724 wrote to memory of 2940 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 28 PID 2724 wrote to memory of 2940 2724 8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe"C:\Users\Admin\AppData\Local\Temp\8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\9398.tmp"C:\Users\Admin\AppData\Local\Temp\9398.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8648e56e7f3fdaba7c034aa324d9bd50097b024b1acd6bf9e8cd82f149592095.exe 070992CAFBE371EE5484A93241DBF783F7B6FDE2AA0FBA42BB593229A36E75C8531C5346929E162A59381C481E216C5C6D8BAB3EEE15313B6E7888E77575F7C32⤵
- Deletes itself
- Executes dropped EXE
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5fbb3a3a4f2add580c1c18a933943a0ea
SHA114622f1b2f394d7e428f206a2a46de51e20dd0af
SHA2567599e6fbcaf004daa64f2836be1f8b4e43bff185c897eefedca49c4acfc8e5d4
SHA5129b7d5dd3ae9f943e3d86c4f81702b55a2fe0cb54d8f89b6364c6a235af36ef73d5dad9e08b7682f6af39de9f2473eb7654810ec17c152660826e95c0413560c9