Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:20
Behavioral task
behavioral1
Sample
be79122eae46ac69a694654e0530c45c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
be79122eae46ac69a694654e0530c45c.exe
Resource
win10v2004-20231215-en
General
-
Target
be79122eae46ac69a694654e0530c45c.exe
-
Size
2.4MB
-
MD5
be79122eae46ac69a694654e0530c45c
-
SHA1
eedbf783a56a8413bea05469a08e33e251f13a19
-
SHA256
148d1252aa0983a44ad116e1570e0578a60b4dc23c49c1f7df42343bc0f9e2ec
-
SHA512
21144530ab4399f56206d1fc8fe7204b792048b025a2dcb13adc701f93814ecf3abd48e40163b6c822292cb38f83d9f32f706af62bcd85cf2ee1b0568655ef3a
-
SSDEEP
49152:EKGOin2lEH+vypuQAajXp6/NBIP4M338dB2IBlGuuDVUsdxxjr:EKGR2+HpGajMVBIgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4788 be79122eae46ac69a694654e0530c45c.exe -
Executes dropped EXE 1 IoCs
pid Process 4788 be79122eae46ac69a694654e0530c45c.exe -
resource yara_rule behavioral2/memory/2380-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x008600000001b58d-11.dat upx behavioral2/memory/4788-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2380 be79122eae46ac69a694654e0530c45c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 be79122eae46ac69a694654e0530c45c.exe 4788 be79122eae46ac69a694654e0530c45c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 4788 2380 be79122eae46ac69a694654e0530c45c.exe 89 PID 2380 wrote to memory of 4788 2380 be79122eae46ac69a694654e0530c45c.exe 89 PID 2380 wrote to memory of 4788 2380 be79122eae46ac69a694654e0530c45c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\be79122eae46ac69a694654e0530c45c.exe"C:\Users\Admin\AppData\Local\Temp\be79122eae46ac69a694654e0530c45c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\be79122eae46ac69a694654e0530c45c.exeC:\Users\Admin\AppData\Local\Temp\be79122eae46ac69a694654e0530c45c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5031a48c9d8b2325f3fd6ad5c076749e8
SHA1d498084aafcf4c476dcd3941d51645957213465b
SHA25669096d25b6c278ab959ce71d0827b155318c4e3a51ad3677cb5fd146d69eba08
SHA5121b843089c2d44359f36dac7170fa52857a5f945f884649a89759a2339685f752e23f5e30af5966313a3e5f38359b38b186876784cd255b27540073b3ff458e18