Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
b70cfb57b0e1f99ef6dd535497e3e2e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b70cfb57b0e1f99ef6dd535497e3e2e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b70cfb57b0e1f99ef6dd535497e3e2e0N.exe
-
Size
333KB
-
MD5
b70cfb57b0e1f99ef6dd535497e3e2e0
-
SHA1
8e2e3813b9997c99b92d5bf4ab038a5b23d083e8
-
SHA256
0b19b676edd66ffebe7a0cc35304fe28c023fa75039158589e4cb6c055d89f1e
-
SHA512
1748b08e838696b352f7f6ce4478175a63455c3def2ce72622d34ce68b8e34d7f94945dcbcf92537b18472eb87956dc5a0d8da28596e648a9eba00c3ff8fbeef
-
SSDEEP
6144:rLNq+AWFKSsicxtGnDS2hAqKub409yy6atBWONLRIaUOkKr:rL0zWFK7icxsnDS2hRfk097trIahP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1308 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1308 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1308 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe 31 PID 1712 wrote to memory of 1308 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe 31 PID 1712 wrote to memory of 1308 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe 31 PID 1712 wrote to memory of 1308 1712 b70cfb57b0e1f99ef6dd535497e3e2e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b70cfb57b0e1f99ef6dd535497e3e2e0N.exe"C:\Users\Admin\AppData\Local\Temp\b70cfb57b0e1f99ef6dd535497e3e2e0N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\b70cfb57b0e1f99ef6dd535497e3e2e0N.exeC:\Users\Admin\AppData\Local\Temp\b70cfb57b0e1f99ef6dd535497e3e2e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5dcb8853cb1256188dd63e77444565ef5
SHA11ff053618703f70338e38c985c5aadd55d1f31de
SHA25667039700de3f7b4b775dc6de606e4e6c16b9fb4c9fb345682908cea57d7e92a9
SHA5126215c1c29147d429463b82cb4fe2fd933c207fed78ea2bd2f36875aa226e58050fea64661cab123dcb03191dd769236b9ad7a1bea0eb0b448a9549929bf1f322