Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05-06-2024 21:19

General

  • Target

    3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe

  • Size

    4.4MB

  • MD5

    09460f7dbc4573b6b15d553e6ff58303

  • SHA1

    a32473ef1c69539c388168995446ab2659048b68

  • SHA256

    3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d

  • SHA512

    f5d0298b6d13959be3103d5447b810d370f56968248b0b3324ec5e0156693e5f39dab63309a2c77773d6dcf9aab489fe4529b1a8d0a6206303abb929639614c1

  • SSDEEP

    98304:emhd1UryeM/+vxChnDE03RMV7wQqZUha5jtSn:elvvxuDzq2QbaZte

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe
    "C:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\23C6.tmp
      "C:\Users\Admin\AppData\Local\Temp\23C6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 9F5AEFDA266CB54688DD8B3C74BFC02D3F6FC7DEFEC43E31F47DD3B3B84560EDD670328C52EF9C9FE2BD12A95B71F1CFDD40F5B9CF41B3B0AC2052B159A6C6DE
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\23C6.tmp

    Filesize

    4.4MB

    MD5

    6c47392b3c9d789047f5d4179d4aefcb

    SHA1

    2e6e6545600f3b8908136a309173dbd50898fcba

    SHA256

    6c53322065eedc4665f123c9c672f6c6e4e4f6f0710706371653fcb3842d9651

    SHA512

    b721c3906b57505b82cf409747219837a5540ba2c26c89257663afd1b57d51f52bbe4e79e36349bcbf14502e67bb2ddd1fa79425337d5ec54815e72b464a5317

  • memory/2068-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2980-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB