Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe
Resource
win10v2004-20240508-en
General
-
Target
7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe
-
Size
6.0MB
-
MD5
03402519c39be7ef48d6427507352742
-
SHA1
4cb94bdd8c657f85c0aa45d4af3ee0453bb1b975
-
SHA256
7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c
-
SHA512
9b5c1f5948b11f5d1c9d63a11c1580487262d10bd0fdcac70549543622472bd3d37e6fe388f8bc31d2092b0ba251c94d024d3139ee85aaa9e994599dfc3f3de9
-
SSDEEP
98304:emhd1Uryex8lGQCXvagW81zV7wQqZUha5jtSyZIUS:elo1+vLFh2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 2839.tmp -
Executes dropped EXE 1 IoCs
pid Process 2736 2839.tmp -
Loads dropped DLL 2 IoCs
pid Process 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2736 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 28 PID 2400 wrote to memory of 2736 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 28 PID 2400 wrote to memory of 2736 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 28 PID 2400 wrote to memory of 2736 2400 7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe"C:\Users\Admin\AppData\Local\Temp\7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7a4089ff63e67881baaf1889c302cc7a3b259308685d57aa01326dbb6148ce1c.exe 9684DE8B637B83359DB324AFFBE2671B33684B33E1E4F603D965DF53D30EFECD08660769463DB08B0162E5EBE52399E4BAEE5DA85BD95DB0D80908149527A3742⤵
- Deletes itself
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD50e726150e487035ea07750b2d795586c
SHA138e5433f9870c3e30189932139b260d80b45e9c1
SHA256f03feb940904550d2863edabdae8ed1b7088c16daee25b8ffbf5a18992463e79
SHA512a7cb153aca1eb73c1cf248c5581c124dfb9ca3bc15d01fcfd9a03d4c8df73f87dd44ba3021684b13eecf7a58f9938650a9710cd80a961369a15cd60664a6710d