Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 14:53

General

  • Target

    6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.exe

  • Size

    7.7MB

  • MD5

    c22a3d985c7b658cf832c2b503f183a4

  • SHA1

    9dac2af6fedc5a7acf51e0263f744cd5ba188d26

  • SHA256

    6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1

  • SHA512

    0bea2cbafe8919fac66de1f739e5e30302be57d8c5553e1cb55dd733a8eed4ef3cfb4c84c7ed7d07d7e1b3d03dcfedc6e90b0ca2aae2bf25e327494af767014c

  • SSDEEP

    196608:wCFjgcgkVomT0frpiYW0PVZXCYclPCi3XzB+n6:rsptPXCdlPc6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.exe
    "C:\Users\Admin\AppData\Local\Temp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\is-8EL3V.tmp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8EL3V.tmp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.tmp" /SL5="$30156,7176349,832512,C:\Users\Admin\AppData\Local\Temp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-8EL3V.tmp\6f07a4ef60303ac42c52008d70f8eee891541c55fbc52a551a3675a1c8e8a9d1.tmp

    Filesize

    3.0MB

    MD5

    ff5481c0bc058bbb78c804962ff00fb7

    SHA1

    032ccb6f7fe8bc1906d1a31bd7e66741e15d0a57

    SHA256

    5e530dcd9bb90c2d72548a6ded623d672ddf1a3625404a8a4791f6484a48f4c9

    SHA512

    873995ffb90de8dce3cc11bcd71aaa32115382970fc271fcab72b1c290a33cc778571d54b36c82679d60e68cae0fc61f7d41119f50d87ced21093ef958de7938

  • memory/2888-9-0x0000000000400000-0x000000000071B000-memory.dmp

    Filesize

    3.1MB

  • memory/2888-11-0x0000000000400000-0x000000000071B000-memory.dmp

    Filesize

    3.1MB

  • memory/3036-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3036-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/3036-10-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB