Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:48
Behavioral task
behavioral1
Sample
addd3dbc9e4f4f99618a4a3788b6f332.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
addd3dbc9e4f4f99618a4a3788b6f332.exe
Resource
win10v2004-20231215-en
General
-
Target
addd3dbc9e4f4f99618a4a3788b6f332.exe
-
Size
1.5MB
-
MD5
addd3dbc9e4f4f99618a4a3788b6f332
-
SHA1
71a40b9ef4caf389cd952e65431200d57176fa8e
-
SHA256
8288d898918ce69db6c9005c313e287790059544f1b40615d8179292c8baa9fb
-
SHA512
8fe036262a69a9121a6aea5636553d59ec0a47c844e1ead337d1039c47d0630d6d08b02e4e89fe59126616992ba1854aae11b661acccd85e694fac7bc5c9a49c
-
SSDEEP
24576:/b6sS16PQj9WVzxRQZDQavL5PpoLEX3w4QZwP7ZZqOf7lAmqgcaXApUEoaQs7t9g:/b6N16U9IzxRQrvL5poL4w4TTZbzTqLx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2592 addd3dbc9e4f4f99618a4a3788b6f332.exe -
Executes dropped EXE 1 IoCs
pid Process 2592 addd3dbc9e4f4f99618a4a3788b6f332.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe -
resource yara_rule behavioral1/memory/2320-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b0000000139e0-13.dat upx behavioral1/files/0x000b0000000139e0-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe 2592 addd3dbc9e4f4f99618a4a3788b6f332.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2592 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe 17 PID 2320 wrote to memory of 2592 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe 17 PID 2320 wrote to memory of 2592 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe 17 PID 2320 wrote to memory of 2592 2320 addd3dbc9e4f4f99618a4a3788b6f332.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\addd3dbc9e4f4f99618a4a3788b6f332.exe"C:\Users\Admin\AppData\Local\Temp\addd3dbc9e4f4f99618a4a3788b6f332.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\addd3dbc9e4f4f99618a4a3788b6f332.exeC:\Users\Admin\AppData\Local\Temp\addd3dbc9e4f4f99618a4a3788b6f332.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD511b6b5c99d713587ed554f49d708cb3f
SHA144fa4c3501df236b72a2aee3fb0d8613c2867e84
SHA256e8b04141ab1178b05f7322347c35584d01b2d3e66cbfccf96b3e36984231d5a9
SHA51210f28c861f323b9d084d91214283c2ea8be65cb14d7a9a0ec44797151bbf641ebe5a92d15f92939b4d3f16a9ec181bf30dd72e89097cb5eb58c760158152c0b5
-
Filesize
410KB
MD5e35cbbc7bc5badbbf52dfce8805146e6
SHA13a6293bab2b93ed2164e5047bdc426555c1762c8
SHA2560a38edf6a9e0f725884e1159d9050caf8312c71475ce1261c1fce001ddb3ddf2
SHA5120936a7985e4cc51f122a543826dc25866eaefca85f9856ff06ee9a9107d524f5d4415439c540b5a05a916fb9168f16dcedba9ca00fe985c1554436a233be988b