Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
e8c8e421f15025622d3a3539826d694e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e8c8e421f15025622d3a3539826d694e.exe
Resource
win10v2004-20240704-en
General
-
Target
e8c8e421f15025622d3a3539826d694e.exe
-
Size
3.5MB
-
MD5
e8c8e421f15025622d3a3539826d694e
-
SHA1
c24c7f8b0e35ecda9fcc136d1b80591319c20aea
-
SHA256
1f580992702aa9b114cfd5ddc5e7b58ed5a7843b4d593b3b7a9c57cfb0e4075f
-
SHA512
a83fe367426b236d1b32ef3dc732cd54e053b0077719ac523250a962ccd6ebfaecf82fce8684bc9482904c2b06703e308779aa3f3ee7ca0a0f1f11e3e41b8d6b
-
SSDEEP
98304:lkLVJrsIW0iWAhIVzzvteuNacrkX/dBJciRx7m:mXvviIVz7te2JrkPdHc6y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2456 e8c8e421f15025622d3a3539826d694e.tmp -
Loads dropped DLL 1 IoCs
pid Process 760 e8c8e421f15025622d3a3539826d694e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29 PID 760 wrote to memory of 2456 760 e8c8e421f15025622d3a3539826d694e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe"C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\is-PMJDT.tmp\e8c8e421f15025622d3a3539826d694e.tmp"C:\Users\Admin\AppData\Local\Temp\is-PMJDT.tmp\e8c8e421f15025622d3a3539826d694e.tmp" /SL5="$401B0,2793744,808960,C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe"2⤵
- Executes dropped EXE
PID:2456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5dd4df0c0bc385fde97a0d8003d0816c5
SHA1ae3936cafeeb00d07946d0d33ae34b3cd8efbddb
SHA256c2adcaf8c55a6745e1c34223be48045f7665259c20410df79c3c5ea985adeb96
SHA5125f50e047cfa19c48823554278a80170ab382f4fde75368b97cb54a3b86c6899bf52b8ddd1b99afe0149a5c550fd309ab95ab78fbda08d94353432ede1ad7ba46