Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 15:42
Behavioral task
behavioral1
Sample
ddf867e2a639299bfe5f4dde6ec5667a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ddf867e2a639299bfe5f4dde6ec5667a.exe
Resource
win10v2004-20231222-en
General
-
Target
ddf867e2a639299bfe5f4dde6ec5667a.exe
-
Size
4.8MB
-
MD5
ddf867e2a639299bfe5f4dde6ec5667a
-
SHA1
b019acf8c7f80540a617ba6d30ecbedcb8359d6d
-
SHA256
6465637f81415822ba51245da5fea5bf904168a07de6992390f441bea9e93fb5
-
SHA512
5e98bd9e1b6f2c71d8eab4bfd2186edae1c30edc5ed2c78379052ae9d2f0fea1da6c9fc2943e79e65a57b868fa690aa9e0098db7ab2ce9ace76ac22749d8c1a0
-
SSDEEP
98304:OHjsj6CThrw6iwvlRgg3gnl/IVUs1jee2Fl4r60Rgg3gnl/IVUs1jr:LNTCdkgl/iB08r6igl/iBP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1640 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe -
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012274-10.dat upx behavioral1/files/0x000b000000012274-13.dat upx behavioral1/memory/2348-14-0x0000000003E80000-0x000000000436F000-memory.dmp upx behavioral1/memory/1640-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe 1640 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1640 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe 28 PID 2348 wrote to memory of 1640 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe 28 PID 2348 wrote to memory of 1640 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe 28 PID 2348 wrote to memory of 1640 2348 ddf867e2a639299bfe5f4dde6ec5667a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe"C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exeC:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5268146bb8e370e1cdd24f85b62509472
SHA1a941b50d7ff1cb704e0d5512981154782e8248a7
SHA2562348489f85d4f666bed2d6a9536937dbf31a5f44e085fcfb9c29248d6595f58b
SHA51264d7b9dcdcaac2d0cd1c8291694be68fea9e2c01e39df4362cd8be435dace6591ee9e7b81b91082e705ed60e30d8e4db25becc37b6b56fa12836563597484007
-
Filesize
1.1MB
MD596c39412c6b272b1e03dde1634e5073f
SHA1aabc83491166c4afd7ffb84e8f769fc7f0e66b1f
SHA256da93df804877c67afeb52888ee121565613831e1605e16e85894aa1836cd5aee
SHA512bab89c75c4201c9766036ed157bfa8043010f0bc1d726df6665093317ff57f92669fa310ddfff65ad366a15e786088315a350afd404e6f2bb3f19271a8cc65ad