Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe
Resource
win10v2004-20240611-en
General
-
Target
0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe
-
Size
539KB
-
MD5
3a94ed7360fc4fb6b6d3c3139879e6b0
-
SHA1
8a4b9bb627a4777985f3d40d783f4ae60171c178
-
SHA256
0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559
-
SHA512
1650eafc94a99e14d5be607044d4ae53419041d73fe71fff71646cfaf3e099eee0e7d6e69831a30b5192f5355bd491293bb4419f81f45e910c7d27855a31388d
-
SSDEEP
12288:Ld8dsHx5x3F+g4dzcrWg2yBc18bCCwO+TalLN:Ldfx5x30gScrWacimCwO+TalLN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 1AA2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2092 1AA2.tmp -
Loads dropped DLL 1 IoCs
pid Process 1616 0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2092 1616 0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe 28 PID 1616 wrote to memory of 2092 1616 0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe 28 PID 1616 wrote to memory of 2092 1616 0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe 28 PID 1616 wrote to memory of 2092 1616 0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe"C:\Users\Admin\AppData\Local\Temp\0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp" --pingC:\Users\Admin\AppData\Local\Temp\0871a65e77171125669a8f8b0bb5c6ee539f8320b22e74071e343b6d4407a559.exe 969E3DC449A02DD9DDB87CC20B84B5F10EEEAD25D5FEDA196946146A3F0BF61A4B2B89B472169782FDAAD3B1BA1D5EDFF6894EF519C9093BD8D58AB71438D4182⤵
- Deletes itself
- Executes dropped EXE
PID:2092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD56da2379e21029c083f5739f999ca7e80
SHA17dbf4937d0a0e45cd50d9a548a8e0c12dfac150b
SHA256b9218f80ebecde2f4835561ce13b49c4115fc8af15bded007d365cd771f5da12
SHA51241dd649c81cd1dbc235baf696e1d48d042498756710845dbf0f54051caa0b3c630859616d622d49b39303688fa9fae76789d6524f5dc76315e361a2f8f67f0ad