Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe
Resource
win10v2004-20240508-en
General
-
Target
395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe
-
Size
436KB
-
MD5
7e0a309d45c675d2e1c699f3f5d27d67
-
SHA1
5dced30773403822995b96b5deafd4f7c3710d52
-
SHA256
395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e
-
SHA512
5216fe17d58025bfb3e1c6ac5e8fb017d7d944416f99d4cfcc3fb8e48f17602d1bca416b1692e7aef2bd9cfdf6901bbeb009eeb2a677ea2869ead233069f52cf
-
SSDEEP
12288:ED24HuqI8p0LEaQkR0Juqv8kX9eHOdbIYjfOM2IIqtUV8nI1R+iKfz9cbzmkIE4o:ED2nviTtUV8nI1R+iKfz9cbzmkIE4SX3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 624 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe -
Executes dropped EXE 1 IoCs
pid Process 624 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe -
Loads dropped DLL 1 IoCs
pid Process 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 624 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 624 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe 29 PID 1548 wrote to memory of 624 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe 29 PID 1548 wrote to memory of 624 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe 29 PID 1548 wrote to memory of 624 1548 395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe"C:\Users\Admin\AppData\Local\Temp\395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exeC:\Users\Admin\AppData\Local\Temp\395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\395dcd25323f9de18c6ad9873dd0d1e43be7bbafeea99a289b065a777c891a8e.exe
Filesize436KB
MD58e1d2b348d9bc0830bef72a234666cc2
SHA1d58898f692702ef6fe48d0a59a1d52bfc99b3e6b
SHA256fbfdc9850ff0f2e5b0822234c3e46335dd562cc263e4ea9c5c7c9b4e34cd32bb
SHA5127fcfb0c05ba3a4bf123abcf19bc0300cc2c6423d0b18892db43c8f62593e31ad0fa591a52ebb5debce90a7477d3bb3811a77168a89c2a685962ba9135c0093e5