Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
0abc23863772c0202b9e5d7f90f666d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0abc23863772c0202b9e5d7f90f666d9.exe
Resource
win10v2004-20231222-en
General
-
Target
0abc23863772c0202b9e5d7f90f666d9.exe
-
Size
84KB
-
MD5
0abc23863772c0202b9e5d7f90f666d9
-
SHA1
bffa6e5748837e1e348b38a4a9fbf37a57be4fec
-
SHA256
64b06291afac152d40f35e8c753070133cd887d529c0774daeba8a5dd6282218
-
SHA512
7f0bbe681c5eabb21a26df371854ceb478b739f7591fe909b95e1844e32bb533226fa1f34e2eb268114d42e432bfecc1877a70822e3769ff86184ad5e0fcc83f
-
SSDEEP
1536:NOaa4yz4Ck0frSAs3UU4pdksxXol97ILN8wi2WjRpdPw/WyjvaovfAzo:NOk0fre3U5Tksmzky3jnWO0va+wo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 0abc23863772c0202b9e5d7f90f666d9.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 0abc23863772c0202b9e5d7f90f666d9.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 0abc23863772c0202b9e5d7f90f666d9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 0abc23863772c0202b9e5d7f90f666d9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2192 0abc23863772c0202b9e5d7f90f666d9.exe 2056 0abc23863772c0202b9e5d7f90f666d9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2056 2192 0abc23863772c0202b9e5d7f90f666d9.exe 29 PID 2192 wrote to memory of 2056 2192 0abc23863772c0202b9e5d7f90f666d9.exe 29 PID 2192 wrote to memory of 2056 2192 0abc23863772c0202b9e5d7f90f666d9.exe 29 PID 2192 wrote to memory of 2056 2192 0abc23863772c0202b9e5d7f90f666d9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0abc23863772c0202b9e5d7f90f666d9.exe"C:\Users\Admin\AppData\Local\Temp\0abc23863772c0202b9e5d7f90f666d9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\0abc23863772c0202b9e5d7f90f666d9.exeC:\Users\Admin\AppData\Local\Temp\0abc23863772c0202b9e5d7f90f666d9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5220a123a5295f583f47d9b6ac6848cbf
SHA1d25796247c7c9ec2b169b9b90c14e69764f3543c
SHA25602f325afff99aa58c2f6bcc3ee78aa768274234b1796afe6b2816b7639d9546c
SHA5124c03cfa3ad69857e852f16c5b674a8e9d0585780d8e79b31ff891b030c7b1caa29f0c2cae6afe3fcc749512bbde264276ba3e84610dc261f4cf1d5904aa3afe8