Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 21:03

General

  • Target

    33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe

  • Size

    192KB

  • MD5

    0293381e57203dcf3f9e87f08e9edcfa

  • SHA1

    80bf3adafe275b4dda7fb67d9d9fefbf8f8e84e2

  • SHA256

    33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850

  • SHA512

    dd844e56cc50dbb22523a3a87162e364cb367a0d13e24912e1a4bf6e720b63093077bb4872bc5121970732fe01e59f1cd271d8e0fa9d52b1a73ca83791fd228f

  • SSDEEP

    3072:+8ONq+5yRoOZUOPa7NqDOcN7bmGGGvwGcLekTXHIOdb/HRU5ZPcRnYcsqmAPT0qB:+LNq+AWFKSsicxtGnnS2hAqKub4w

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
    "C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
      C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1320

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe

          Filesize

          192KB

          MD5

          f6d444b069003c68738c79959a91ddbd

          SHA1

          57c20bdc36e8ebf13659a64cb49d0817ca0328c0

          SHA256

          2427d2c23c8ec6b1a11dced890f5a9272549aaf8a212e9ffa56d5ae8fb1abc79

          SHA512

          dd4fdebbf5efc2b62eb5ab025513f3fd4e01b3511aefd30b5e03ea6306f68369f7ff3e403d90d90c42d9c53fc188a2325e43407a7cbcb63e57212b39e247aeba

        • memory/1320-11-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/1320-16-0x0000000000130000-0x0000000000167000-memory.dmp

          Filesize

          220KB

        • memory/2256-0-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/2256-6-0x0000000002C60000-0x0000000002C97000-memory.dmp

          Filesize

          220KB

        • memory/2256-10-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB