Analysis
-
max time kernel
156s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:40
Behavioral task
behavioral1
Sample
117eb244b91eaa4ff431dfd4d160d63d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
117eb244b91eaa4ff431dfd4d160d63d.exe
Resource
win10v2004-20231215-en
General
-
Target
117eb244b91eaa4ff431dfd4d160d63d.exe
-
Size
2.9MB
-
MD5
117eb244b91eaa4ff431dfd4d160d63d
-
SHA1
ff80b0b5f38b50e065f0232edd52438d00ad215d
-
SHA256
e1230d43ed573792e015107d8fe9cdad0d71bf421904ebd7836f3a40185ac0eb
-
SHA512
956b911e1433ac2a131286c0ceff1a046c251f40124d6168c373d9fd43de4f17439ca68d7b7e8197d3416a7222b2b49e77e6b074e9479d4dc6a3e30e267cfe33
-
SSDEEP
49152:7cmBfdxiXRvocAQhlcTN74NH5HUyNRcUsCVOzetdZJ:7cefdyTW4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 117eb244b91eaa4ff431dfd4d160d63d.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 117eb244b91eaa4ff431dfd4d160d63d.exe -
resource yara_rule behavioral2/memory/1832-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002320d-11.dat upx behavioral2/memory/2284-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1832 117eb244b91eaa4ff431dfd4d160d63d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1832 117eb244b91eaa4ff431dfd4d160d63d.exe 2284 117eb244b91eaa4ff431dfd4d160d63d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2284 1832 117eb244b91eaa4ff431dfd4d160d63d.exe 90 PID 1832 wrote to memory of 2284 1832 117eb244b91eaa4ff431dfd4d160d63d.exe 90 PID 1832 wrote to memory of 2284 1832 117eb244b91eaa4ff431dfd4d160d63d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\117eb244b91eaa4ff431dfd4d160d63d.exe"C:\Users\Admin\AppData\Local\Temp\117eb244b91eaa4ff431dfd4d160d63d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\117eb244b91eaa4ff431dfd4d160d63d.exeC:\Users\Admin\AppData\Local\Temp\117eb244b91eaa4ff431dfd4d160d63d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5bf45651b855c0a8a82ecbdd3a6e4e96e
SHA129bb5571c85cbf987037595c6a27580810eb7090
SHA256078e0966ce6a7e456cf95843154eed7934a5e103b807c0cfb5ada40d98ad456a
SHA51259fe4427918fa4813c96fafc97e85cf9085f915b625b2367ea57da48a0fade80da11d4468b7ef9bcccf89ab175262bf1891f7bdb2fa63aa40e855791a968c9a2