Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:51
Behavioral task
behavioral1
Sample
afc4f96b05b7bca79e6440bdd04ab7ce.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
afc4f96b05b7bca79e6440bdd04ab7ce.exe
Resource
win10v2004-20231215-en
General
-
Target
afc4f96b05b7bca79e6440bdd04ab7ce.exe
-
Size
2.7MB
-
MD5
afc4f96b05b7bca79e6440bdd04ab7ce
-
SHA1
eaa5b45e298d9216f66ab9d86d3c9edac0f3fad3
-
SHA256
934467558c7f5e524f1b60b4c7489276d04511d418899f90203f08ca4a64ea9b
-
SHA512
427b6d8129848327fc2f87e04b365238a026c344960fccdfe9a23b564dc6eaf812ae9dffee3d1b0a09127fd785ff61f4c909eacb1639cbd86a87d980c645e1f5
-
SSDEEP
49152:G5514GLst9MHGk5/P/TNbmAVffrZolfWyIReJ6Sp6jpwjSe6VMq5a0a9Srf:O52JmGk5/P/ZmAVnrZolTYSINmwe0Awf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 afc4f96b05b7bca79e6440bdd04ab7ce.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 afc4f96b05b7bca79e6440bdd04ab7ce.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe -
resource yara_rule behavioral1/memory/2204-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2940-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000013a1a-13.dat upx behavioral1/files/0x000a000000013a1a-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe 2940 afc4f96b05b7bca79e6440bdd04ab7ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2940 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe 16 PID 2204 wrote to memory of 2940 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe 16 PID 2204 wrote to memory of 2940 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe 16 PID 2204 wrote to memory of 2940 2204 afc4f96b05b7bca79e6440bdd04ab7ce.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc4f96b05b7bca79e6440bdd04ab7ce.exe"C:\Users\Admin\AppData\Local\Temp\afc4f96b05b7bca79e6440bdd04ab7ce.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\afc4f96b05b7bca79e6440bdd04ab7ce.exeC:\Users\Admin\AppData\Local\Temp\afc4f96b05b7bca79e6440bdd04ab7ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD59bbd0b9acc702de368b0ddfa2562e664
SHA1f7e76de16164a1b669113bdfbbca9d876f2c7f0c
SHA256c7dd5be297e03d3b18b45933a909c157891a9b40803c1c67c539b7d500334aa2
SHA5125bc41d91faf9bbf568bcdeb7537fbada1492be48f9cb0b26852491098163f54c33567627e77174e7c9b2634552c9f6e45504f7eb653ba3524c78be7554621110
-
Filesize
18KB
MD595d7e41faf72039b56555548ce573e95
SHA12625cb192bbaf947e44cec47ad2b33496c123743
SHA2565218113561d19f3ac154de86a334b33beed51ed525bf77a380d95e002287b0cc
SHA512a456306cd0349e1ab27c7c630fb6d810d74c226b1473face94eb0cc6f644213b5942a5a4a950357850a41f3829511b859c91bcfb7e774a141b2c0d15115c8c79