Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
0d7872268eebf547507767b47c0b4b38.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d7872268eebf547507767b47c0b4b38.exe
Resource
win10v2004-20231215-en
General
-
Target
0d7872268eebf547507767b47c0b4b38.exe
-
Size
84KB
-
MD5
0d7872268eebf547507767b47c0b4b38
-
SHA1
c5e76d06d6e72bce8e52c3a51795a1a9d65882e0
-
SHA256
bebab53fc3dd3fb7e1d934dc37e962872cd1bf92520a3d25f63d73d4f719fe50
-
SHA512
cda891455fc4dbe5e8d2dd3f04670a6371a8f93b63ce9bcffc6c67ec72f4f4230647074f5be04b478e74abc151fb246a5b042d8d7c459dde36b975abda185e4b
-
SSDEEP
1536:nBiQlK2CP6sUk2s4140SH9cGs1K/Yg9a8VEASlIR8D7wRkzVRN8/Ny8x9EJlt2O:BiQf0U7PSH9cQ19aUVSy8D7wRkzVX898
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 0d7872268eebf547507767b47c0b4b38.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 0d7872268eebf547507767b47c0b4b38.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 0d7872268eebf547507767b47c0b4b38.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 0d7872268eebf547507767b47c0b4b38.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 0d7872268eebf547507767b47c0b4b38.exe 2856 0d7872268eebf547507767b47c0b4b38.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2856 2980 0d7872268eebf547507767b47c0b4b38.exe 29 PID 2980 wrote to memory of 2856 2980 0d7872268eebf547507767b47c0b4b38.exe 29 PID 2980 wrote to memory of 2856 2980 0d7872268eebf547507767b47c0b4b38.exe 29 PID 2980 wrote to memory of 2856 2980 0d7872268eebf547507767b47c0b4b38.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d7872268eebf547507767b47c0b4b38.exe"C:\Users\Admin\AppData\Local\Temp\0d7872268eebf547507767b47c0b4b38.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\0d7872268eebf547507767b47c0b4b38.exeC:\Users\Admin\AppData\Local\Temp\0d7872268eebf547507767b47c0b4b38.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5acb0cda0afc47af1b3fb55321d1e2e03
SHA147ba787d3795d7154e54bf3c63c860eb7467dbf9
SHA256967218be507754fd07c6ee2a38b9b5a11c7bc63b5127340de1d9a392c3c20d6b
SHA5126ba3d19c8c32d0089e697e7f50ee8a1a8382b688957a5911b9dd65a8d79c2be0387d59c91de3c4ba94a2bd762ce65d498a5e0224a4857774d64213276639627f