Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe
Resource
win10v2004-20240508-en
General
-
Target
1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe
-
Size
4.2MB
-
MD5
61dfa8e1bdcc720e24b7bb1f274d7bbb
-
SHA1
acb80d73acfc223ae39f3494d7d1da6a22e05bac
-
SHA256
1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363
-
SHA512
5640c276942504bc047ded004dece29aa23deab8d043865c154aca086e62a2f88027bd4e558dfe4194b23c9de9f921a79bc9f0272af530ebf3314e5df22604d8
-
SSDEEP
98304:Cmhd1UryeZBTf9ZYEJOwlT/KVcIAVLUjH5oxFbxhVLUjH5oxFbx:ClPTVKWOw92AVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 2185.tmp -
Executes dropped EXE 1 IoCs
pid Process 2232 2185.tmp -
Loads dropped DLL 2 IoCs
pid Process 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2232 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe 28 PID 1384 wrote to memory of 2232 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe 28 PID 1384 wrote to memory of 2232 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe 28 PID 1384 wrote to memory of 2232 1384 1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe"C:\Users\Admin\AppData\Local\Temp\1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1512293f90f92219a19bf5f8d3c35144b214ee26e0c3576ee1bf67c5a33aa363.exe CA7327F362D229B2CFED642C07D04F6955B5B11B803136A824116F2CD178E691716E27AC5366B9EED1A80A430BD3EE73D6DFE4D3748050504807BCA413BA93002⤵
- Deletes itself
- Executes dropped EXE
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD555509fbf2dd5f1f49834c42c4ea016b0
SHA132a0628e566a925864a6766633e79023b3caef8e
SHA2568b9d7f478bc652464f6c1460e45f0036953068d2c0880df90693981e7923c1e7
SHA512c0407e08f2799d5ff063370f63e3a94de6bb2bc33eddc5777c05e8d669a0c1f6594b5112111d3587ecc39e3083740e1d89b79dc73f4a1b026944e42c4f47541f