Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 08:07
Static task
static1
Behavioral task
behavioral1
Sample
a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe
Resource
win7-20240704-en
General
-
Target
a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe
-
Size
24KB
-
MD5
a6f86e1af16ab6dc5bb0824b79d4a1d0
-
SHA1
c617b7c8e0a4e2c3587f2ee89da0be8d655443f9
-
SHA256
d49b7c53b9493f64813aa78dc69f907920a2151193b9914efe3274db8301b641
-
SHA512
3b60a1bf501b0d837dd2729164064f8759027f211fe6fc9475a65792bdffdb6b0a679397a94199c363e0af9946024fed8f9f6f7a3820649cee36b014ce540990
-
SSDEEP
768:ErznmMeTddsf9F7Rj8tXQ8vGIDflLLdlBF+pbb8:EfmrTdGu5Zv/f5m8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 rmass.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe -
resource yara_rule behavioral1/files/0x000700000001211b-1.dat upx behavioral1/memory/2064-6-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rmass.exe a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe File created C:\Windows\SysWOW64\rmass.exe a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe"C:\Users\Admin\AppData\Local\Temp\a6f86e1af16ab6dc5bb0824b79d4a1d0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\rmass.exe"C:\Windows\system32\rmass.exe"2⤵
- Executes dropped EXE
PID:2064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58c9495ff3e155e3e96c5ff492f81af1f
SHA17912796f51b63f80685d01ae609680e9071f841e
SHA2565cacdac931bc0937a2eabf60c36a30ae9914e3301ba5a71b6c65fd80bbdebc56
SHA51251ea5c4c0b832e76b7e4af3692260cc3f7f85b1b57936d08984bcda40a743d986584469d80916b7e02e6e19ad0c1d6640aa7b9252520434834c5791385f2b1d3