Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:26
Behavioral task
behavioral1
Sample
ef05a5ee32ab70625c915adc36ccb749.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ef05a5ee32ab70625c915adc36ccb749.exe
Resource
win10v2004-20231215-en
General
-
Target
ef05a5ee32ab70625c915adc36ccb749.exe
-
Size
11.7MB
-
MD5
ef05a5ee32ab70625c915adc36ccb749
-
SHA1
3d7324b7b08fdbe6cdc5f56422d948336ee6bea0
-
SHA256
5c125b5d8b34c02cedd0954a0c98e5545fdec0b72d7baf409ff2c875a59cbd94
-
SHA512
002016f238665013978432b58cc932e9b5ca49f37a57a3f54b92f1ae3540d89cbb925ff79aba010671db1cd7d6c160b57a81d8be25b43a4387a13d156f2d7ca4
-
SSDEEP
196608:rKw6KCWCOeUW2WCH/Ao8YVQiWCOeUW2WC:rKw6Vdp2Fo92dp2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 60 ef05a5ee32ab70625c915adc36ccb749.exe -
Executes dropped EXE 1 IoCs
pid Process 60 ef05a5ee32ab70625c915adc36ccb749.exe -
resource yara_rule behavioral2/memory/3088-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023216-11.dat upx behavioral2/memory/60-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3088 ef05a5ee32ab70625c915adc36ccb749.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3088 ef05a5ee32ab70625c915adc36ccb749.exe 60 ef05a5ee32ab70625c915adc36ccb749.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 60 3088 ef05a5ee32ab70625c915adc36ccb749.exe 92 PID 3088 wrote to memory of 60 3088 ef05a5ee32ab70625c915adc36ccb749.exe 92 PID 3088 wrote to memory of 60 3088 ef05a5ee32ab70625c915adc36ccb749.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef05a5ee32ab70625c915adc36ccb749.exe"C:\Users\Admin\AppData\Local\Temp\ef05a5ee32ab70625c915adc36ccb749.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\ef05a5ee32ab70625c915adc36ccb749.exeC:\Users\Admin\AppData\Local\Temp\ef05a5ee32ab70625c915adc36ccb749.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:60
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5362e5e073ec8e81a1afd7b2f548374bf
SHA1e63e66924971c08e1599ce1e07a1852189efb5ac
SHA2569ab097a0d29a480782425924619275852fbca1a971eb78568deff2bb14ee0a63
SHA5121299da9013d26270f88d1cd279d5ce07dfb12b347268521d568a9dd9f5e9ff4602bb857d0d8f74b5ce471d1f78d29ed6b6159a50e0afc89c62f98fd04ba21ac8