Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe
Resource
win10v2004-20240611-en
General
-
Target
420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe
-
Size
359KB
-
MD5
8ef0a2657f0bde56a2607f699d375b71
-
SHA1
25ff48049181d1a6c1a2fb56fe533e7ca3dca7b2
-
SHA256
420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66
-
SHA512
0f7fd8855a61b021467901a6f8f9d6f877b78d866e526409cef99bd71efa5e104336b48f3262981d129de534e574de59c93d0d7347ba7ff44e516231a5b14e58
-
SSDEEP
6144:mZwPC2Zn/rlpAqlt/Lxh/ojKD4q/MgVz4Y5gDKK0LHYtVzbOJo:mZkLTjbLxhAjS4QvVzd5gz0Lexj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2292 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2292 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe 28 PID 2164 wrote to memory of 2292 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe 28 PID 2164 wrote to memory of 2292 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe 28 PID 2164 wrote to memory of 2292 2164 420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe"C:\Users\Admin\AppData\Local\Temp\420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exeC:\Users\Admin\AppData\Local\Temp\420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\420c98e1375dd2d271ebd507ea1ad9cdbe896e12e8dc1bfd675147f472295d66.exe
Filesize359KB
MD53b16275bb5e10993bdb3c3ede621fd69
SHA1a5730864359d0db58ae8c6d920d078ea9743f94e
SHA256fb307f66f4d1c23f5814264638c0897c222d3700cf6d28f9794398b48e31fecc
SHA512953b3f08781defd36f14ead0d11706f5f32deea88eabed39fc86fdb42261a16d8a5906c28151691433e5a302c5d7b1edbce2296164e1a9176c07e8878ae07b62