Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 23:39

General

  • Target

    7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe

  • Size

    579KB

  • MD5

    e52a4df44920b2c3b0a65055ce859e3b

  • SHA1

    058a564f1fededc40d2d146a7ddd2fa9db4b61d5

  • SHA256

    7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1

  • SHA512

    81283d40538149b90daa7353467daac2ccba76a38f5b5f8572cb3a7324c9f63dd12c92f5d9d719a203e7beada65375673092cdeaa0d41e5294e827ebcde1c4e9

  • SSDEEP

    12288:MNdsd8uN4lf+wxqkAhGKYvc8v9881CD6VQ5zCD4VZRDGWF1m3aYhOA6eXV:4s2656VQ5zY431CaYAeXV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe
    "C:\Users\Admin\AppData\Local\Temp\7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe
      C:\Users\Admin\AppData\Local\Temp\7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2920

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7a2e97fee838b034cf1084d50df14ecf092b2ed6a50ea033d21a207141da26e1.exe

          Filesize

          579KB

          MD5

          c2030d4b6ae5f239aab59846f715d53f

          SHA1

          c8c49d6bc37276fd064463acd66452c4453df862

          SHA256

          3b46140415b6906dd2985ac59f31804314deee4f6df6c2409fb5aec0c163784b

          SHA512

          6115403cf6bf82be2cd25585d108c9fbced4a8413dcb7003b0dfc308b60dab2c2e9ab9f09cc385131fe967f0743eb681338b5a929f00deb45ed7cb8595165f64

        • memory/2788-0-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2788-9-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2920-10-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2920-12-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2920-16-0x0000000000130000-0x0000000000171000-memory.dmp

          Filesize

          260KB