Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe
Resource
win10v2004-20240704-en
General
-
Target
a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe
-
Size
656KB
-
MD5
c00a124130c358a9769fee170ca5eb41
-
SHA1
0c5e5d27e88f667b924757a0f5e1ebcf9d375825
-
SHA256
a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023
-
SHA512
983ec421d0a762194ad8c0700990f4997d9b494961f61e5cd077855784ac6ce53716b733426a6588c81851eea4398c589065263b81e5c1fc9b2d6c5d683002e0
-
SSDEEP
12288:l6SaY5OtiNT70Z69e9tfzVQ5zCD4VZRDGWF1m3aYhOA6eXVQ5zCD8:lhOtxZ6k9tfzVQ5zY431CaYAeXVQ5zY8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2120 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2120 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2120 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe 31 PID 2080 wrote to memory of 2120 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe 31 PID 2080 wrote to memory of 2120 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe 31 PID 2080 wrote to memory of 2120 2080 a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe"C:\Users\Admin\AppData\Local\Temp\a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exeC:\Users\Admin\AppData\Local\Temp\a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2120
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a6e1621136f6506065d5f329b14c34ff2cee8553383eb15a84b908aa448cc023.exe
Filesize656KB
MD57434f8c28e45270459081d5fb7af290c
SHA1c21f3a5be2e89ab4427b9db8e26f49550798768f
SHA2561f14b9b91386c3dbfe129dc08948ec7df5d8b468ed87031bf55f1b87e9fe944c
SHA51243a1883faffee8ef8b65eebb527169ba9111bd8d88198a8ce241d4ba76a9311e7b6f6ff0da9e4b516f73c482fe622b8ab35112d2c8dd2605fee1201467c9e4e1