Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe

  • Size

    68.0MB

  • MD5

    301ab254348c4beb03c43663c51b8c8b

  • SHA1

    e6c668de0c643232b01c86fd8060ea2caacfca99

  • SHA256

    72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a

  • SHA512

    8d8c39a1280683c1d05d71f8c49bd22679463ffa64ecbd60319832d3de6e209473d748d72a81e0cb2a5d71823ea70c9edd273afb488ab9a625222483914ad46b

  • SSDEEP

    1572864:+1YnA7A8R7tqEwTDYKJbQ0JxcgjnrUBOO8CPOLJreZq+hhXcI:+10A7B+DYKJbndjnoH8MhhXcI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe
    "C:\Users\Admin\AppData\Local\Temp\72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpCED3.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\system32\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:1160
      • C:\ProgramData\Graphics Reconstructor\qvp6ql03.exe
        "C:\ProgramData\Graphics Reconstructor\qvp6ql03.exe"
        3⤵
        • Executes dropped EXE
        PID:2384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpCED3.tmp.bat

    Filesize

    347B

    MD5

    b40eb3a01332cc446aca3c382c4c296a

    SHA1

    cfda0ec1a54d19baeb785f165a6508b93a7893e5

    SHA256

    a1da76fb8d3846deef60951589b626ad919df3e403a011c33dc8ce29a4851c33

    SHA512

    aacaf637901532530b2b94d88a8852654e1043c05c7de5bcc1b6b45d9b60dc6fbcf44dc4db9be904c4e9bf474e264f41bd8f8a481b7757294e1344e22c545546

  • memory/2380-0-0x000007FEF5283000-0x000007FEF5284000-memory.dmp

    Filesize

    4KB

  • memory/2380-1-0x0000000000F80000-0x0000000000F88000-memory.dmp

    Filesize

    32KB

  • memory/2384-15-0x000007FEF4893000-0x000007FEF4894000-memory.dmp

    Filesize

    4KB

  • memory/2384-14-0x0000000001240000-0x0000000001248000-memory.dmp

    Filesize

    32KB

  • memory/2384-16-0x000007FEF4893000-0x000007FEF4894000-memory.dmp

    Filesize

    4KB