Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 10:48
Behavioral task
behavioral1
Sample
863749db0174fc590d17a8230adbb190.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
863749db0174fc590d17a8230adbb190.exe
Resource
win10v2004-20231215-en
General
-
Target
863749db0174fc590d17a8230adbb190.exe
-
Size
116KB
-
MD5
863749db0174fc590d17a8230adbb190
-
SHA1
2f7949d6983c9e3e62c1fed25e4f7c4cdc30c70c
-
SHA256
e448aea2db268bb236f337f69230e23e2126d63a7d356c5efcdfaf2ea31c1120
-
SHA512
04fa6da39aff941355098ef5f9e0191d19c96a100357ed2a0fb93d012df30adaaedde043eb3953c47c274dcbedfaeb47477970621b7fd920b7eacbbf3ce38cea
-
SSDEEP
3072:6zZwFzmY5dYNa+gq/d0d/QqVBA/A7C0LyPTmXRLu:mxYtqSogB/7r+P8k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 863749db0174fc590d17a8230adbb190.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 863749db0174fc590d17a8230adbb190.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 863749db0174fc590d17a8230adbb190.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/files/0x000c000000011fde-11.dat upx behavioral1/memory/2108-13-0x0000000000170000-0x00000000001E6000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 863749db0174fc590d17a8230adbb190.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 863749db0174fc590d17a8230adbb190.exe 2968 863749db0174fc590d17a8230adbb190.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2968 2108 863749db0174fc590d17a8230adbb190.exe 29 PID 2108 wrote to memory of 2968 2108 863749db0174fc590d17a8230adbb190.exe 29 PID 2108 wrote to memory of 2968 2108 863749db0174fc590d17a8230adbb190.exe 29 PID 2108 wrote to memory of 2968 2108 863749db0174fc590d17a8230adbb190.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\863749db0174fc590d17a8230adbb190.exe"C:\Users\Admin\AppData\Local\Temp\863749db0174fc590d17a8230adbb190.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\863749db0174fc590d17a8230adbb190.exeC:\Users\Admin\AppData\Local\Temp\863749db0174fc590d17a8230adbb190.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5859d12714b343bb195500a75bd9043d3
SHA14958af96c8859890a83bd9ee374b7ba22828f3a2
SHA2563d86e4c1540478cdb2522b8194da041ce46c96261a318ed747dfd8ba0feddd87
SHA512b302793ffbed7c81746bc0c553d83cca5304ba5532a59045704363603d0acd3bc714b0f3154feef60f46fea0bd66225501078a0f1c7d7060e1db6161366c25fd