Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 22:11
Static task
static1
Behavioral task
behavioral1
Sample
14cc94a3f39a9b19aa2717690e8b9f93.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14cc94a3f39a9b19aa2717690e8b9f93.exe
Resource
win10v2004-20231215-en
General
-
Target
14cc94a3f39a9b19aa2717690e8b9f93.exe
-
Size
82KB
-
MD5
14cc94a3f39a9b19aa2717690e8b9f93
-
SHA1
fe6b7a97617a206ffea74535ca2186780347dce1
-
SHA256
4e91af4108adcc4de4cc50f9940408b2b8c55486a8c8e318987afae2d7446ef0
-
SHA512
db40e09829572f1629c75c6bb862f6d2932a90269e96a50dcf86dcceb8eda5de2a02e29ead4de0327e0d59328dd4ea9c4859b288cb341c30792ea79ba0aa4fbd
-
SSDEEP
1536:ckN6UPZOju/Glj0xwrn85ADrL58eplrsGVPnYPR8Bi6QhN/CqHztQ1fY:cA6UkBNN85s5NlsGdYZ6iJzTtQfY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3584 14cc94a3f39a9b19aa2717690e8b9f93.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 14cc94a3f39a9b19aa2717690e8b9f93.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2056 14cc94a3f39a9b19aa2717690e8b9f93.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2056 14cc94a3f39a9b19aa2717690e8b9f93.exe 3584 14cc94a3f39a9b19aa2717690e8b9f93.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 3584 2056 14cc94a3f39a9b19aa2717690e8b9f93.exe 29 PID 2056 wrote to memory of 3584 2056 14cc94a3f39a9b19aa2717690e8b9f93.exe 29 PID 2056 wrote to memory of 3584 2056 14cc94a3f39a9b19aa2717690e8b9f93.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14cc94a3f39a9b19aa2717690e8b9f93.exe"C:\Users\Admin\AppData\Local\Temp\14cc94a3f39a9b19aa2717690e8b9f93.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\14cc94a3f39a9b19aa2717690e8b9f93.exeC:\Users\Admin\AppData\Local\Temp\14cc94a3f39a9b19aa2717690e8b9f93.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5c21a675f31fb2faa0b2bbe428a5ecbd3
SHA1d37d5f6ce4c6d52b4d27bc99a5703b719523ac38
SHA25692ef293d85d270144dc25153ff43690bb633074bceb9b1820d6025c1e810427d
SHA5123ff9de35a8a097ca2b0dc959238c4c7fa5f2a68c8df7a65eac769b1b2c6ab1c506d0862b25f5e5a07d07b227a7d3269d2692b84121f9759ee423f04bbeb72c2c