Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
0685b6d443bbf3727d397306fcb5fc10.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0685b6d443bbf3727d397306fcb5fc10.exe
Resource
win10v2004-20240508-en
General
-
Target
0685b6d443bbf3727d397306fcb5fc10.exe
-
Size
4.2MB
-
MD5
0685b6d443bbf3727d397306fcb5fc10
-
SHA1
6668950050a7452f3c73ce45c349e9bc14ec150a
-
SHA256
73a945c7b51299f8320ffa56d29137b3fe296c681d9e2103124af07aedbf65b3
-
SHA512
9cc3fc659cd6e90ee47d8074a586a693a777c2997764069249d9f58ba5f72a01bf0ed445698894e6a1c684ef8021426e493da52b002543ada5aba784ed15ff42
-
SSDEEP
98304:Cmhd1UryepjW4lsfwaLfuidz81pAZMVLUjH5oxFbxhVLUjH5oxFbx:ClJjaIaLfuiy1GKVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 1D22.tmp -
Executes dropped EXE 1 IoCs
pid Process 2332 1D22.tmp -
Loads dropped DLL 2 IoCs
pid Process 2128 0685b6d443bbf3727d397306fcb5fc10.exe 2128 0685b6d443bbf3727d397306fcb5fc10.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2332 2128 0685b6d443bbf3727d397306fcb5fc10.exe 28 PID 2128 wrote to memory of 2332 2128 0685b6d443bbf3727d397306fcb5fc10.exe 28 PID 2128 wrote to memory of 2332 2128 0685b6d443bbf3727d397306fcb5fc10.exe 28 PID 2128 wrote to memory of 2332 2128 0685b6d443bbf3727d397306fcb5fc10.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0685b6d443bbf3727d397306fcb5fc10.exe"C:\Users\Admin\AppData\Local\Temp\0685b6d443bbf3727d397306fcb5fc10.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0685b6d443bbf3727d397306fcb5fc10.exe 1D7143DBFFD1BD0A1AF3D93499E6C0A0065C46C0016D895E7E1C1307FC6E342917E52487466D3D993E7E4DBC01BE8F922763498C31E4E99F7365BDD1D4ABB9712⤵
- Deletes itself
- Executes dropped EXE
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD557ed5e158e1ace4b9fb9c53041efe5f9
SHA1c6a07c581fd223a242f570719cff137d2f649bd0
SHA2568c2cce1c32b449d00ee7667858468b0f0137c0d3ce8560aed32d4a207952beb0
SHA5125ad5baf8dcc0d5d6a4f95131cd5193415a25b91d63a446e62eef77eb23b2a3c18e6415744f1ba87ad0e7725e4f9d31f749496bf3f5705a9b96f4485ba07e324f