Analysis

  • max time kernel
    142s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 04:00

General

  • Target

    e8c8e421f15025622d3a3539826d694e.exe

  • Size

    3.5MB

  • MD5

    e8c8e421f15025622d3a3539826d694e

  • SHA1

    c24c7f8b0e35ecda9fcc136d1b80591319c20aea

  • SHA256

    1f580992702aa9b114cfd5ddc5e7b58ed5a7843b4d593b3b7a9c57cfb0e4075f

  • SHA512

    a83fe367426b236d1b32ef3dc732cd54e053b0077719ac523250a962ccd6ebfaecf82fce8684bc9482904c2b06703e308779aa3f3ee7ca0a0f1f11e3e41b8d6b

  • SSDEEP

    98304:lkLVJrsIW0iWAhIVzzvteuNacrkX/dBJciRx7m:mXvviIVz7te2JrkPdHc6y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe
    "C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\is-PMJDT.tmp\e8c8e421f15025622d3a3539826d694e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PMJDT.tmp\e8c8e421f15025622d3a3539826d694e.tmp" /SL5="$401B0,2793744,808960,C:\Users\Admin\AppData\Local\Temp\e8c8e421f15025622d3a3539826d694e.exe"
      2⤵
      • Executes dropped EXE
      PID:2456

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-PMJDT.tmp\e8c8e421f15025622d3a3539826d694e.tmp

    Filesize

    3.0MB

    MD5

    dd4df0c0bc385fde97a0d8003d0816c5

    SHA1

    ae3936cafeeb00d07946d0d33ae34b3cd8efbddb

    SHA256

    c2adcaf8c55a6745e1c34223be48045f7665259c20410df79c3c5ea985adeb96

    SHA512

    5f50e047cfa19c48823554278a80170ab382f4fde75368b97cb54a3b86c6899bf52b8ddd1b99afe0149a5c550fd309ab95ab78fbda08d94353432ede1ad7ba46

  • memory/760-0-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/760-2-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/760-10-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/2456-8-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2456-11-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB