Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
OFFICE365 CHECKER FAST PROXYLESS.exe
Resource
win7-20240419-en
General
-
Target
OFFICE365 CHECKER FAST PROXYLESS.exe
-
Size
12.3MB
-
MD5
9f52957212a1b9b485fc6d92c5722db8
-
SHA1
fa7abe5bb5aca80538373cb9e4c7ec6e2d097a16
-
SHA256
06f18c05b6a52cea7751c0ee3fbec0f8977b0689f879899c04ac83c8f7612621
-
SHA512
52b895cd8d2fe97482831b38da0e5e81fd2fac0659d6546566547f5cf70a1083992418366d819fc9f4781b8f77cf57d3a9ad05805ea07a69c444cd6cb6728fc6
-
SSDEEP
196608:LfPkFVno6+uXJWIj8KkUx2R4NzHdQmR5dA6lRuErSEEJwdF6sxw1yYPU1kspt1J:LHEVFJWQsUcR4NzHdQ2lR+9JUiylHD
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
OFFICE365 CHECKER FAST PROXYLESS.exepid process 2516 OFFICE365 CHECKER FAST PROXYLESS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
OFFICE365 CHECKER FAST PROXYLESS.exedescription pid process target process PID 1720 wrote to memory of 2516 1720 OFFICE365 CHECKER FAST PROXYLESS.exe OFFICE365 CHECKER FAST PROXYLESS.exe PID 1720 wrote to memory of 2516 1720 OFFICE365 CHECKER FAST PROXYLESS.exe OFFICE365 CHECKER FAST PROXYLESS.exe PID 1720 wrote to memory of 2516 1720 OFFICE365 CHECKER FAST PROXYLESS.exe OFFICE365 CHECKER FAST PROXYLESS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OFFICE365 CHECKER FAST PROXYLESS.exe"C:\Users\Admin\AppData\Local\Temp\OFFICE365 CHECKER FAST PROXYLESS.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OFFICE365 CHECKER FAST PROXYLESS.exe"C:\Users\Admin\AppData\Local\Temp\OFFICE365 CHECKER FAST PROXYLESS.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI17202\python311.dllFilesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
memory/1720-0-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/1720-3-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/1720-1-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/1720-2-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/1720-36-0x0000000002E80000-0x00000000034C6000-memory.dmpFilesize
6.3MB
-
memory/1720-77-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/2516-37-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/2516-38-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/2516-40-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/2516-39-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB
-
memory/2516-44-0x000000013FBA0000-0x00000001401E6000-memory.dmpFilesize
6.3MB