Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
1e5bed3fca71ec3725501ed57958abd1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e5bed3fca71ec3725501ed57958abd1.exe
Resource
win10v2004-20231215-en
General
-
Target
1e5bed3fca71ec3725501ed57958abd1.exe
-
Size
84KB
-
MD5
1e5bed3fca71ec3725501ed57958abd1
-
SHA1
35315bd7139460da6f95afb5027a598f2a18c628
-
SHA256
37629da3d01cd8d11cd659bc956367d99c050735ecf407795bb9703fd2aedf1b
-
SHA512
fc8ca09ea7939501c6d015a09d8b44e9e0bad21e2b58d68f770baf217b26b8d68b107438c77f1ea74e077b0b46f1db63bbdb35f335764def6316c80479cc1188
-
SSDEEP
1536:N8SsCAlbzvuBtyqzGiW6BqV/AYieZiyAHKc0BmWW8rKBlqMtBN/n9AEZ:Nq1lfsZzjW6BkAZeZhaGBNj+BlLnlAEZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1996 1e5bed3fca71ec3725501ed57958abd1.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 1e5bed3fca71ec3725501ed57958abd1.exe -
Loads dropped DLL 1 IoCs
pid Process 1336 1e5bed3fca71ec3725501ed57958abd1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1336 1e5bed3fca71ec3725501ed57958abd1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1336 1e5bed3fca71ec3725501ed57958abd1.exe 1996 1e5bed3fca71ec3725501ed57958abd1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1996 1336 1e5bed3fca71ec3725501ed57958abd1.exe 29 PID 1336 wrote to memory of 1996 1336 1e5bed3fca71ec3725501ed57958abd1.exe 29 PID 1336 wrote to memory of 1996 1336 1e5bed3fca71ec3725501ed57958abd1.exe 29 PID 1336 wrote to memory of 1996 1336 1e5bed3fca71ec3725501ed57958abd1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e5bed3fca71ec3725501ed57958abd1.exe"C:\Users\Admin\AppData\Local\Temp\1e5bed3fca71ec3725501ed57958abd1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\1e5bed3fca71ec3725501ed57958abd1.exeC:\Users\Admin\AppData\Local\Temp\1e5bed3fca71ec3725501ed57958abd1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD502dc192ece847a7d7ba370daa168bf1f
SHA1f81c77c14344cead97c972839da9b6ada7db736b
SHA25672bd108a86896f2b135dc4238c5d693dd4b6f645510f070e64d861ea5895325b
SHA51220941202c5cbb21384a53768286a3e139abd65827a245de7adf7b3862dd0d1226205ce2f654db841cb5437c03adce36dcf0ae9d71b9407a9ae281d9b4f0ab97e