Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe
Resource
win10v2004-20240226-en
General
-
Target
d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe
-
Size
1.6MB
-
MD5
1fefbfe4a877b4018eac17b5acfd2608
-
SHA1
6bd2dcd662392efaf566e6cc4c8c246278337eae
-
SHA256
d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722
-
SHA512
c358ec55d8f968fc281119bf4cbbef93bd1508da9017a0146a8748a990b4516049cc2cb5c1b7abb9e32e6e1d44cce729569262a37159ab7270f2077d09bcd082
-
SSDEEP
24576:E5ibHPQHZHCtCO/CpCaxxCV7sZ5/pM4dma4EM4dmv5BTqV0EM4dmv5Bc:8iT4HZbxIgZVa4L4j425Iyj425S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2008 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2008 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe 28 PID 2748 wrote to memory of 2008 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe 28 PID 2748 wrote to memory of 2008 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe 28 PID 2748 wrote to memory of 2008 2748 d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe"C:\Users\Admin\AppData\Local\Temp\d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exeC:\Users\Admin\AppData\Local\Temp\d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\d17d3e14273d6d7903c52101fe706bfa5f2e59aa6072e7c106b73b516c8f8722.exe
Filesize1.6MB
MD501a619f1d67589bd7005df6e84df617c
SHA1670f63af70337c075f0a4b50f81b7a3efae81468
SHA256c13af869e695aa31d6c787b1b09d2e397e17b6e292b708ddf22f5b96f4e5f190
SHA512afca5266048f78b0589a4b52e72e5b896961b5a40f3b54644f577304a854176e2035347465b03dad6ef5bfebe0dcb7dc239453f3d78ce94a7ddb257857874eb7