Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
282f11ac525604080082dc72d8552f00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
282f11ac525604080082dc72d8552f00N.exe
Resource
win10v2004-20240704-en
General
-
Target
282f11ac525604080082dc72d8552f00N.exe
-
Size
220KB
-
MD5
282f11ac525604080082dc72d8552f00
-
SHA1
388a4904e1fc720568a0ee5905eabe8d3ff921f1
-
SHA256
0b4ca2ac189d667bf99564ccf369108e8e9bf337092b82137f1cd583c5dbffc1
-
SHA512
dc9c8c685ff8939454d700dd5c4a828bffee749def15b020a261b80f3bac358645264f3d5b68aa23f5a3fea0e532fbf1d18d90ada797f2f116a65a3f93552499
-
SSDEEP
6144:ryPxFZ2oo4+SarhkX3ZrVrNBVU5aI/ui1qZYCt:rEEPrkZBrN7U5aI/OZYCt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 282f11ac525604080082dc72d8552f00N.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 282f11ac525604080082dc72d8552f00N.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 282f11ac525604080082dc72d8552f00N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2648 282f11ac525604080082dc72d8552f00N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2808 282f11ac525604080082dc72d8552f00N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2808 2648 282f11ac525604080082dc72d8552f00N.exe 31 PID 2648 wrote to memory of 2808 2648 282f11ac525604080082dc72d8552f00N.exe 31 PID 2648 wrote to memory of 2808 2648 282f11ac525604080082dc72d8552f00N.exe 31 PID 2648 wrote to memory of 2808 2648 282f11ac525604080082dc72d8552f00N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe"C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exeC:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5557e3886d39c5a54473916688585ab36
SHA1d0ea66fc91ec0b0232fb3c426d72e3714fd11194
SHA256ee3e1b6556cdeddbc17bfe6fbd0af8caffcfab22f2d9e3173a356583052f8962
SHA5123293a10e57e341df4a59076a8156199df978e3ceef82b44e1ae395a9151b5b46ccbf65124eb1fe806a6ddd534157e6417a43afbbd8574b9835fb9b23eda5ab3b