Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
0e8d408335abb38e6adb566af91361ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e8d408335abb38e6adb566af91361ae.exe
Resource
win10v2004-20231215-en
General
-
Target
0e8d408335abb38e6adb566af91361ae.exe
-
Size
57KB
-
MD5
0e8d408335abb38e6adb566af91361ae
-
SHA1
d794ed3ffd88dbbc05d86cf8afe6b2ae2a969a78
-
SHA256
97cb2fcf3c31cada5dc14f959107a2cb47ec7f3d7ae8640b9ac4a5786ac3a015
-
SHA512
6d904366fb7c099bedda04336b45472c99a82e4883b026df9d3b05251112639c8752bd72f7c06ae80b51ba656d3e34f497c2f81ebe327c8ada6cbbd6b31c91f6
-
SSDEEP
1536:4K50x04+EeYWIWcih5+hJ030MR74wCv89RUEHU:9fXY/YhUn030q74pvkRvHU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3020 0e8d408335abb38e6adb566af91361ae.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 0e8d408335abb38e6adb566af91361ae.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 0e8d408335abb38e6adb566af91361ae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 0e8d408335abb38e6adb566af91361ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 0e8d408335abb38e6adb566af91361ae.exe 3020 0e8d408335abb38e6adb566af91361ae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3020 2112 0e8d408335abb38e6adb566af91361ae.exe 29 PID 2112 wrote to memory of 3020 2112 0e8d408335abb38e6adb566af91361ae.exe 29 PID 2112 wrote to memory of 3020 2112 0e8d408335abb38e6adb566af91361ae.exe 29 PID 2112 wrote to memory of 3020 2112 0e8d408335abb38e6adb566af91361ae.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe"C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exeC:\Users\Admin\AppData\Local\Temp\0e8d408335abb38e6adb566af91361ae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD52012eb044200c728795008a65bf5502c
SHA1b69bd74169faeba7089b70215907fb6945a5ce37
SHA25664182bf1d1aca19cb172faee7d49e076755f6587774b6b3ece354bf852f00510
SHA5128ce1958999365e96e56373485f70801e88c0bbe886ab5b0c1b8f5b6805eccb8306f0790a2715f7415e78f98f7029b5d7a41273beb1a7ca7721c74005c217a685