Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 17:44
Static task
static1
Behavioral task
behavioral1
Sample
0927a20cfdd95461edf8ace6e2920975.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0927a20cfdd95461edf8ace6e2920975.exe
Resource
win10v2004-20231215-en
General
-
Target
0927a20cfdd95461edf8ace6e2920975.exe
-
Size
105KB
-
MD5
0927a20cfdd95461edf8ace6e2920975
-
SHA1
95dc3b72dcaeba882486c8480ee3bf9fcd6b184a
-
SHA256
92ac14c4fa442f3cbb46e4df7fc3d3d7cc080534c9256fdcd1c3977ad4c6ce6e
-
SHA512
ce7f006d962d9b4e85e4da6de8e6017e15fb181c40edfb7352cd949ff5840e3c91d079a6b150e4a17500e4f9440e8876c7da7ccda79a283c8470bb0ad36cfaeb
-
SSDEEP
1536:mct+aKxos5K/5ANSGqqQYzETJjlBaMdLJZqm++mt3s8MfiTt6DtW9YH:PtmvQhXjBXJ7VDqLVupW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1580 0927a20cfdd95461edf8ace6e2920975.exe -
Executes dropped EXE 1 IoCs
pid Process 1580 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2644 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2644 0927a20cfdd95461edf8ace6e2920975.exe 1580 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1580 2644 0927a20cfdd95461edf8ace6e2920975.exe 90 PID 2644 wrote to memory of 1580 2644 0927a20cfdd95461edf8ace6e2920975.exe 90 PID 2644 wrote to memory of 1580 2644 0927a20cfdd95461edf8ace6e2920975.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe"C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exeC:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD539bf1aeff5b375f45e965da470dc34e0
SHA1971b393418c7fba51cff981d9c50baaee8e4c11b
SHA256aecf928ecbee6cfc77a700db7a338d638b7e290527fb541a4ff35330e5729b99
SHA512357801097a9a9a89018110e83713336e04ad1538de70a649ff91d7a49a0c8a31ba1f89660838b10edfdf721ac814f2fe954941b44c0effd5208bf40ffe86fae1