Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 03:51

General

  • Target

    282f11ac525604080082dc72d8552f00N.exe

  • Size

    220KB

  • MD5

    282f11ac525604080082dc72d8552f00

  • SHA1

    388a4904e1fc720568a0ee5905eabe8d3ff921f1

  • SHA256

    0b4ca2ac189d667bf99564ccf369108e8e9bf337092b82137f1cd583c5dbffc1

  • SHA512

    dc9c8c685ff8939454d700dd5c4a828bffee749def15b020a261b80f3bac358645264f3d5b68aa23f5a3fea0e532fbf1d18d90ada797f2f116a65a3f93552499

  • SSDEEP

    6144:ryPxFZ2oo4+SarhkX3ZrVrNBVU5aI/ui1qZYCt:rEEPrkZBrN7U5aI/OZYCt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe
    "C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe
      C:\Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2808

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\282f11ac525604080082dc72d8552f00N.exe

    Filesize

    220KB

    MD5

    557e3886d39c5a54473916688585ab36

    SHA1

    d0ea66fc91ec0b0232fb3c426d72e3714fd11194

    SHA256

    ee3e1b6556cdeddbc17bfe6fbd0af8caffcfab22f2d9e3173a356583052f8962

    SHA512

    3293a10e57e341df4a59076a8156199df978e3ceef82b44e1ae395a9151b5b46ccbf65124eb1fe806a6ddd534157e6417a43afbbd8574b9835fb9b23eda5ab3b

  • memory/2648-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2648-8-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2808-10-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2808-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2808-16-0x00000000001C0000-0x0000000000201000-memory.dmp

    Filesize

    260KB

  • memory/2808-17-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB