Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:56
Behavioral task
behavioral1
Sample
09ec1135a03940ff97d0374c85e9f036.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09ec1135a03940ff97d0374c85e9f036.exe
Resource
win10v2004-20231215-en
General
-
Target
09ec1135a03940ff97d0374c85e9f036.exe
-
Size
353KB
-
MD5
09ec1135a03940ff97d0374c85e9f036
-
SHA1
7392c308f7f60581f770e0a7bf45607bf0636db3
-
SHA256
792b97213cb0bf14ce21a716f2bae49b3a2912dc1a05cc30d90ba7fd106a3dfa
-
SHA512
0b948368ff74d09d51a0d8f2017f166e014469466da10353ec15c59822c06ab09323e7a82742aee3ebd98681b3f5a993fb9484a6a980100c6302dc255e4af91f
-
SSDEEP
6144:pQdE2yUNJZzPgo1WYDxqbKjWZUuBEqSgmdYdxfsLPrPwo+:pQu2yUNDPgo1WrWcpodYTfmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 09ec1135a03940ff97d0374c85e9f036.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 09ec1135a03940ff97d0374c85e9f036.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 09ec1135a03940ff97d0374c85e9f036.exe -
resource yara_rule behavioral1/memory/2644-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000d0000000122da-10.dat upx behavioral1/memory/2644-15-0x0000000001500000-0x00000000015F1000-memory.dmp upx behavioral1/memory/2340-17-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000d0000000122da-16.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2644 09ec1135a03940ff97d0374c85e9f036.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2644 09ec1135a03940ff97d0374c85e9f036.exe 2340 09ec1135a03940ff97d0374c85e9f036.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2340 2644 09ec1135a03940ff97d0374c85e9f036.exe 25 PID 2644 wrote to memory of 2340 2644 09ec1135a03940ff97d0374c85e9f036.exe 25 PID 2644 wrote to memory of 2340 2644 09ec1135a03940ff97d0374c85e9f036.exe 25 PID 2644 wrote to memory of 2340 2644 09ec1135a03940ff97d0374c85e9f036.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ec1135a03940ff97d0374c85e9f036.exe"C:\Users\Admin\AppData\Local\Temp\09ec1135a03940ff97d0374c85e9f036.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\09ec1135a03940ff97d0374c85e9f036.exeC:\Users\Admin\AppData\Local\Temp\09ec1135a03940ff97d0374c85e9f036.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5d4dbe7c6e763b334f5b8bdc46540e77e
SHA140443e6b8d65554e9ea2a46e606af40bcb7a9168
SHA25638eb5afd7f0fcb015e6cca88046a2b5cb6c2e6760a5cab33c82e0699d2621511
SHA512e79e6bf82a23371de2cce27c66d437640c315673df37f84fc9df4b25146cd7ab1f4b2408aa948d3f052d0ba18ac8986ba81ed93ac39eaecc6b2e9113ad803b7c
-
Filesize
85KB
MD5bef2e059a8316a3499cbf91a778f4527
SHA1d810657300932b0e55f9d5e82dbc523ccbe3c3ac
SHA2568ae26b9e08bd5f11bacdf0815df6293932b470f8fadfb8b1d611523dcbac6fd1
SHA512dc6e386b9e4e0840460995ac930931f5f736dd2b7f8f94f923ef1335cf1e77259ed3e1a13eeb6db0673d89895415d98f24abc638cf4adf0d5621263760cafeb1