Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe
Resource
win10v2004-20240426-en
General
-
Target
3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe
-
Size
4.4MB
-
MD5
09460f7dbc4573b6b15d553e6ff58303
-
SHA1
a32473ef1c69539c388168995446ab2659048b68
-
SHA256
3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d
-
SHA512
f5d0298b6d13959be3103d5447b810d370f56968248b0b3324ec5e0156693e5f39dab63309a2c77773d6dcf9aab489fe4529b1a8d0a6206303abb929639614c1
-
SSDEEP
98304:emhd1UryeM/+vxChnDE03RMV7wQqZUha5jtSn:elvvxuDzq2QbaZte
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 23C6.tmp -
Executes dropped EXE 1 IoCs
pid Process 2068 23C6.tmp -
Loads dropped DLL 2 IoCs
pid Process 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2068 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 28 PID 2980 wrote to memory of 2068 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 28 PID 2980 wrote to memory of 2068 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 28 PID 2980 wrote to memory of 2068 2980 3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe"C:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3abb2dd0085dc22ac8aae342d15600bc3c640310fb3af11200fd45b4ce18f17d.exe 9F5AEFDA266CB54688DD8B3C74BFC02D3F6FC7DEFEC43E31F47DD3B3B84560EDD670328C52EF9C9FE2BD12A95B71F1CFDD40F5B9CF41B3B0AC2052B159A6C6DE2⤵
- Deletes itself
- Executes dropped EXE
PID:2068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD56c47392b3c9d789047f5d4179d4aefcb
SHA12e6e6545600f3b8908136a309173dbd50898fcba
SHA2566c53322065eedc4665f123c9c672f6c6e4e4f6f0710706371653fcb3842d9651
SHA512b721c3906b57505b82cf409747219837a5540ba2c26c89257663afd1b57d51f52bbe4e79e36349bcbf14502e67bb2ddd1fa79425337d5ec54815e72b464a5317