Analysis

  • max time kernel
    15s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 09:36

General

  • Target

    01c3929d803730edc702fc9228ebea20N.exe

  • Size

    1024KB

  • MD5

    01c3929d803730edc702fc9228ebea20

  • SHA1

    3ed6398b33fd1bc14af480b167ddeb91a757c5d2

  • SHA256

    6f940da0bc2ef7dcb996677b17f31892400849fbda021d78048706fe660377a9

  • SHA512

    a14c47f83f316875fdbbed2f303f2a1c4bf1c4d733ef7327cf6eda2184558ac92c5d002b0150a42f2119f4f8cd6d038d74877ca2c6549847511ece563449c9c3

  • SSDEEP

    24576:Tax32n1jfMwo50mr0w8VUlxLgLZmN1DUZmSordfq6H:TaxG1Wr+ezIZmXYZmSadfq+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01c3929d803730edc702fc9228ebea20N.exe
    "C:\Users\Admin\AppData\Local\Temp\01c3929d803730edc702fc9228ebea20N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\F853.tmp
      "C:\Users\Admin\AppData\Local\Temp\F853.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\F853.tmp

    Filesize

    1024KB

    MD5

    85a9eef307891b207c21382f83f0d665

    SHA1

    eaf125ee09b661b455149071d01be82b15998817

    SHA256

    35bfdd9cdf469faa773379db11b02d29de5f4687702ef6255aff1101564bbbcc

    SHA512

    cc19299c58f62b3ff59ef3c0ee66f4a791adebd8afdf885f59a71378b33a0998954a2def7ac57df8ee226695c3fa7fa272d08e061c09f272e991c156bf8536a3