Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:26
Behavioral task
behavioral1
Sample
a2e7695394c2b29df1cbe827122a7803.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a2e7695394c2b29df1cbe827122a7803.exe
Resource
win10v2004-20231215-en
General
-
Target
a2e7695394c2b29df1cbe827122a7803.exe
-
Size
2.4MB
-
MD5
a2e7695394c2b29df1cbe827122a7803
-
SHA1
cec5c4702ba848d7c0551c75a96d983141f4db4e
-
SHA256
b1ed064707b9edeff0ace7e598b2165ccd3dc06c617ebca2742b15c1275d54a1
-
SHA512
832d102c29763aaf23e4019c85328dc8924ce0744a1cac12412f2e8fdaf9f3a9366b71b6d2f2ee7adbbd8d26bc37011969cf369d117c8d0a5ca6ed026e7656fa
-
SSDEEP
49152:DKi1I1xTnLhtxbKBM6995654d3PuDP4M338dB2IBlGuuDVUsdxxjr:DKiS/P0O6PE54d3mDgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3304 a2e7695394c2b29df1cbe827122a7803.exe -
Executes dropped EXE 1 IoCs
pid Process 3304 a2e7695394c2b29df1cbe827122a7803.exe -
resource yara_rule behavioral2/files/0x000400000001e96f-11.dat upx behavioral2/memory/5072-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5072 a2e7695394c2b29df1cbe827122a7803.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5072 a2e7695394c2b29df1cbe827122a7803.exe 3304 a2e7695394c2b29df1cbe827122a7803.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3304 5072 a2e7695394c2b29df1cbe827122a7803.exe 19 PID 5072 wrote to memory of 3304 5072 a2e7695394c2b29df1cbe827122a7803.exe 19 PID 5072 wrote to memory of 3304 5072 a2e7695394c2b29df1cbe827122a7803.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e7695394c2b29df1cbe827122a7803.exe"C:\Users\Admin\AppData\Local\Temp\a2e7695394c2b29df1cbe827122a7803.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\a2e7695394c2b29df1cbe827122a7803.exeC:\Users\Admin\AppData\Local\Temp\a2e7695394c2b29df1cbe827122a7803.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD547428a5bb5ab7c588575112176c9a7d5
SHA1ed602683f62ca152e4b7dfa2a78afb90dd2bfc9b
SHA2563ab8c426fe727ce0e5f418978a58f8c771fd752a7f6cbc4a1550824d88f516de
SHA5120209f31414360c2af5212171ecc2313c9a6c69684fda9f59b3aa4f1cfd178aec2336a16e1ed72b9d200ef2160f506e4dea6739b0b7d4bcf75584df44f372f558