Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:28
Behavioral task
behavioral1
Sample
f0583613b7d4864731f3dce192b48a39.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f0583613b7d4864731f3dce192b48a39.exe
Resource
win10v2004-20231215-en
General
-
Target
f0583613b7d4864731f3dce192b48a39.exe
-
Size
1.3MB
-
MD5
f0583613b7d4864731f3dce192b48a39
-
SHA1
844473b3c6cecaf9b73d065a0f73fc594c856c45
-
SHA256
752d264bbd3001b65125ca06c608243d4f8158e4387037dd37f0b6b78fff0799
-
SHA512
cd006ad9c7759dd69cdbd3cec400049800414791a06fe3f7da78bc4c34de962ae23c48f01c1b2a260e41fbd6376b1d61ed90677852addf60fdc0379d125855f1
-
SSDEEP
24576:YszTTLoViabgoBNClAWFra8NG+thv88lxYiwi9WVaSRH8uehfUvw8JP0U9/9Us:f/4gYgOiFrW+9jYC9EnRHrewZxR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1176 f0583613b7d4864731f3dce192b48a39.exe -
Executes dropped EXE 1 IoCs
pid Process 1176 f0583613b7d4864731f3dce192b48a39.exe -
resource yara_rule behavioral2/memory/1360-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/1176-14-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000700000002320a-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1360 f0583613b7d4864731f3dce192b48a39.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1360 f0583613b7d4864731f3dce192b48a39.exe 1176 f0583613b7d4864731f3dce192b48a39.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1176 1360 f0583613b7d4864731f3dce192b48a39.exe 16 PID 1360 wrote to memory of 1176 1360 f0583613b7d4864731f3dce192b48a39.exe 16 PID 1360 wrote to memory of 1176 1360 f0583613b7d4864731f3dce192b48a39.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0583613b7d4864731f3dce192b48a39.exe"C:\Users\Admin\AppData\Local\Temp\f0583613b7d4864731f3dce192b48a39.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\f0583613b7d4864731f3dce192b48a39.exeC:\Users\Admin\AppData\Local\Temp\f0583613b7d4864731f3dce192b48a39.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5ca472c9968f6ff3e91dc039f1a2c899f
SHA125b7a72c440ae02e7db99d9bc8faa733b25cd5dc
SHA256f2cc9c7585d413bf52325b9f8dea87b58d55d625917c59bfeba51d66a09ebb16
SHA51250889c71ba91e0702d70912edaef43a9d7553a5d664d4d3ce0e6702dc6a3c7a0e9ee2ddff5b252cc91f229838d7ebce3d95d8f6315de9120bae16e5fdb9fb889