Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 07:32
Behavioral task
behavioral1
Sample
79b1c271a92d7291661b4ac1d21eee05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79b1c271a92d7291661b4ac1d21eee05.exe
Resource
win10v2004-20231215-en
General
-
Target
79b1c271a92d7291661b4ac1d21eee05.exe
-
Size
2.7MB
-
MD5
79b1c271a92d7291661b4ac1d21eee05
-
SHA1
655f4b749f78ae5df4776582c608256e59231c4d
-
SHA256
52a6871e5e018c63c392fc0794183d5f90a95825fcc9e2e46f7e19cdd7de0fbd
-
SHA512
c630c45fea224b245914f5befb2559f9879826a2fff9cb198827cceed26be13ab4c31bbe9242b031b6036364350aa94790aa3d0dec40881503e8ca50aa187611
-
SSDEEP
49152:FF1zM5/kyW0eIi61teKR9NALZ2VgYx2QSfue08mUnmkI3j6Bl:25/kyWDp+wKRAD3We3nmvzK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 79b1c271a92d7291661b4ac1d21eee05.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 79b1c271a92d7291661b4ac1d21eee05.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 79b1c271a92d7291661b4ac1d21eee05.exe -
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x0008000000012284-11.dat upx behavioral1/files/0x0008000000012284-16.dat upx behavioral1/memory/2880-15-0x0000000003820000-0x0000000003C8A000-memory.dmp upx behavioral1/memory/2168-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2880 79b1c271a92d7291661b4ac1d21eee05.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2880 79b1c271a92d7291661b4ac1d21eee05.exe 2168 79b1c271a92d7291661b4ac1d21eee05.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2168 2880 79b1c271a92d7291661b4ac1d21eee05.exe 28 PID 2880 wrote to memory of 2168 2880 79b1c271a92d7291661b4ac1d21eee05.exe 28 PID 2880 wrote to memory of 2168 2880 79b1c271a92d7291661b4ac1d21eee05.exe 28 PID 2880 wrote to memory of 2168 2880 79b1c271a92d7291661b4ac1d21eee05.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b1c271a92d7291661b4ac1d21eee05.exe"C:\Users\Admin\AppData\Local\Temp\79b1c271a92d7291661b4ac1d21eee05.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\79b1c271a92d7291661b4ac1d21eee05.exeC:\Users\Admin\AppData\Local\Temp\79b1c271a92d7291661b4ac1d21eee05.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2168
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b358c37caae8edf41b78b77a7b069f9b
SHA1c17175c911c1d63ab4b2fd84272502910fcb7fa5
SHA256411459ccf9dd5915cfa085eb9cb3a584129c23186bcf27ae321964b929c9681c
SHA512e7500e4eb9ed873088bd6240d77e158c56cd76b27253ef8de9e48cd286f16d7ed7a9b0780378fcfb4f9d8d0bd9038d529f466fd6cc18fb276e7afdcb8a4c4911
-
Filesize
1.6MB
MD5a2b7d918766477bd24e250966d2ef314
SHA1c9b5737660c25354a184bb8de32184d05301397a
SHA2567c7667010b6581582b77be272b4c4188842e84047a4758889242823c2cb9c339
SHA5120acda06151baad49bd759837b18c0db462b8bf04b55023d7349eedc6774757cefde17b6d26047f795db4a65045912fe873e90c00ced218570c36af32b7b95ef1