Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:06
Behavioral task
behavioral1
Sample
b745a6dca889884211b2d16e6eb62b28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b745a6dca889884211b2d16e6eb62b28.exe
Resource
win10v2004-20231215-en
General
-
Target
b745a6dca889884211b2d16e6eb62b28.exe
-
Size
1.4MB
-
MD5
b745a6dca889884211b2d16e6eb62b28
-
SHA1
4284c2ebcdf552ac60e71b8023a535659ce8c075
-
SHA256
0638e9c3278080f0aff66d1f8fcca5564cb0fcec5645143406cd712570d0b28b
-
SHA512
67a9a644bc29d127e00e0715290c21d626fbb0706f6658e3d5a50bfb6a35690fc8f265b0203787ae6ee59de5dac6d226ca8610773a45d1e158fdc3d0706aea47
-
SSDEEP
24576:oaPpECOHokwAAHoV8XE+Z3ajCGWlzjY1dicRTBRIV13hz/2Vts3hW:oaLAK90+5aGZlz4i0TBu3h/2fyh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5028 b745a6dca889884211b2d16e6eb62b28.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 b745a6dca889884211b2d16e6eb62b28.exe -
resource yara_rule behavioral2/memory/4484-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023200-12.dat upx behavioral2/memory/5028-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4484 b745a6dca889884211b2d16e6eb62b28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4484 b745a6dca889884211b2d16e6eb62b28.exe 5028 b745a6dca889884211b2d16e6eb62b28.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 5028 4484 b745a6dca889884211b2d16e6eb62b28.exe 89 PID 4484 wrote to memory of 5028 4484 b745a6dca889884211b2d16e6eb62b28.exe 89 PID 4484 wrote to memory of 5028 4484 b745a6dca889884211b2d16e6eb62b28.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b745a6dca889884211b2d16e6eb62b28.exe"C:\Users\Admin\AppData\Local\Temp\b745a6dca889884211b2d16e6eb62b28.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\b745a6dca889884211b2d16e6eb62b28.exeC:\Users\Admin\AppData\Local\Temp\b745a6dca889884211b2d16e6eb62b28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD5de37757f93979075b4c2ffe9baed76bc
SHA1f9d22f9aa3d2d01635ea0e53105f18b8329206c1
SHA256db9f7f6224f14891934c526fdf10fc79421f0d0e1b5174320b1554c3ff335dd6
SHA512c57ce051df9e476bf6c4245ce93882f21d8b15222730e28c829a14211a75a6329bea7e41298e63d9c72be84aa7efc44526c50aafe2efa09ac4889d6cae464503