Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:57
Behavioral task
behavioral1
Sample
d08c88f2cb6c595652ceacc75b9e1bc8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d08c88f2cb6c595652ceacc75b9e1bc8.exe
Resource
win10v2004-20231215-en
General
-
Target
d08c88f2cb6c595652ceacc75b9e1bc8.exe
-
Size
5.3MB
-
MD5
d08c88f2cb6c595652ceacc75b9e1bc8
-
SHA1
6d51208a254b2885a68c2e656fca9144dab1467f
-
SHA256
e6c8a5abc5c755c9d4c167cb93b231088ec4870b13faa441a7dd56a4f18c96e1
-
SHA512
55ea2e69931e98aa7d10f11890988161c78e6bf470a446ae4a9e456894e01431941d99deb972e7175e5f3ee32a7c935465cbcbdbf5d067a2d96197291bb04b39
-
SSDEEP
98304:oV8vvbObF3I3Yk4hmWTNCfYRTCdMF2UBAw4hF/nty8CCfYRTCdMF2U:08vDK3Ij4hmvfYJCdQNAHhF/EzCfYJCi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 d08c88f2cb6c595652ceacc75b9e1bc8.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 d08c88f2cb6c595652ceacc75b9e1bc8.exe -
resource yara_rule behavioral2/memory/2568-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000f000000023163-12.dat upx behavioral2/memory/2988-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2568 d08c88f2cb6c595652ceacc75b9e1bc8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2568 d08c88f2cb6c595652ceacc75b9e1bc8.exe 2988 d08c88f2cb6c595652ceacc75b9e1bc8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2988 2568 d08c88f2cb6c595652ceacc75b9e1bc8.exe 90 PID 2568 wrote to memory of 2988 2568 d08c88f2cb6c595652ceacc75b9e1bc8.exe 90 PID 2568 wrote to memory of 2988 2568 d08c88f2cb6c595652ceacc75b9e1bc8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe"C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exeC:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5848a0f862501074aecc655b4d81b2f48
SHA1f01aaa10f857373916eab58729b0e4a011147b9a
SHA25669d97e98d089a9e518d165fa641302fad3dc191098a5b4c2dab63c05ee26262c
SHA512e5a86e47a45e53892f322266a8ab8652b4711370e91fe56ef34f126727710507cf67428469106491494e75c565203495eb4658cf56eff7dfe0b1acfec503e6fc