Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Resource
win10v2004-20240704-en
General
-
Target
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
-
Size
448KB
-
MD5
8c23d4da041648056f2aeef1d3821fc0
-
SHA1
ed33789d1d2fe0ad940caf58b89179b04cbe2d4a
-
SHA256
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743
-
SHA512
3dd1499a2677c385f3baea68c4058a4c66927debacb10b5d569589ff59c45552cb6761265092b2c42f24371f6e05c5e62593945c8d080d561a2859d4a1a7671a
-
SSDEEP
6144:5LiHv5tgNOZUVVCf8OoI82wwiWhV40saiigCD4H2cHwXWNzDw:585JZU/aoIfwPWhVQ5zCD4TyWN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Loads dropped DLL 1 IoCs
pid Process 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3068 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 3068 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 29 PID 816 wrote to memory of 3068 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 29 PID 816 wrote to memory of 3068 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 29 PID 816 wrote to memory of 3068 816 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe"C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exeC:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Filesize448KB
MD50b4463240bb472b96d39fe78e2a6d889
SHA13844bca92b79a55034add5deb49660477f5f2fb8
SHA2569a1ab0c38e1ec530db004883ca1fc0ac8359cb6d33a810142dcf336a898fac48
SHA512cb665aa5dcdb40d81d6dce4193cf3d94b57372ce62930be6ddddd0e3ed17fc4514e2a06039064001f7231ee6ccdbab7179fa1fbe1574928f2af121f581a4fc9b