Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe
Resource
win10v2004-20240709-en
General
-
Target
8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe
-
Size
1.6MB
-
MD5
c6086c5e20352e5b5c393706bdb22c81
-
SHA1
a0c8beab68691976a8f4ccbbcfa476f100be9f85
-
SHA256
8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14
-
SHA512
c60161dc8fdcee5b1c050001038cb913979e3157a7cf7e1d0617394cba48ac5532c7558104a4ae757bc3951dd6132694e8a5a574d0f5dafa91b30eeffee107c3
-
SSDEEP
24576:P7FUDowAyrTVE3U5F/JgN2Kic6QL3E2vVsjECUAQT45deRV9R/:PBuZrEU6QKIy029s4C1eH9N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.tmp -
Loads dropped DLL 1 IoCs
pid Process 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30 PID 2180 wrote to memory of 2812 2180 8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe"C:\Users\Admin\AppData\Local\Temp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\is-84MBK.tmp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.tmp"C:\Users\Admin\AppData\Local\Temp\is-84MBK.tmp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.tmp" /SL5="$5014E,832512,0,C:\Users\Admin\AppData\Local\Temp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\is-84MBK.tmp\8a90a0173f957c3413902171648c597202059f2e96d776681e60a2851ef48f14.tmp
Filesize3.1MB
MD50421fb7e338ffd04e5c555ef7fd95f59
SHA1b829803e29b3c1d02aa981dfdc1ee78b67fe4402
SHA2569ccd775542319ea1e7e2721829e29e9779f3f63387666bd8ae02ebd1fedab54c
SHA5122362ad3a7a224d34214de5f4c5615267ce0de12c3909e5b83ad0090f27799d62ea9ca908d0cea671e7a8434885e6fd637c65988ecc3ee4e053a6d23bb787aafd