Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
1f3d4cf5ae004bf41b3a0e4ce144f095.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f3d4cf5ae004bf41b3a0e4ce144f095.exe
Resource
win10v2004-20231215-en
General
-
Target
1f3d4cf5ae004bf41b3a0e4ce144f095.exe
-
Size
82KB
-
MD5
1f3d4cf5ae004bf41b3a0e4ce144f095
-
SHA1
117cd4ee808929f9b31cd8dd348a1d713d480cda
-
SHA256
32241fa49b335042e97daeca1263f5325240cf9917bc5f61b8a1cadb140f5625
-
SHA512
bb603485f32dc68a9450eff0db9decb9db13e39cbf9e8cd2840147a1dff797ca764a0c3987def99de1a1ae06d00ca99383abfd24057c9139ff3374fabab9d050
-
SSDEEP
1536:nFvNrwDAt3qN4NKyLw30UEE2xnC39VTt/9IYvYMv3CaH:Ntwy6N4xsbcC39VTNDYMv3CaH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 1f3d4cf5ae004bf41b3a0e4ce144f095.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 1f3d4cf5ae004bf41b3a0e4ce144f095.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1048 1f3d4cf5ae004bf41b3a0e4ce144f095.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1048 1f3d4cf5ae004bf41b3a0e4ce144f095.exe 1216 1f3d4cf5ae004bf41b3a0e4ce144f095.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1216 1048 1f3d4cf5ae004bf41b3a0e4ce144f095.exe 89 PID 1048 wrote to memory of 1216 1048 1f3d4cf5ae004bf41b3a0e4ce144f095.exe 89 PID 1048 wrote to memory of 1216 1048 1f3d4cf5ae004bf41b3a0e4ce144f095.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3d4cf5ae004bf41b3a0e4ce144f095.exe"C:\Users\Admin\AppData\Local\Temp\1f3d4cf5ae004bf41b3a0e4ce144f095.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\1f3d4cf5ae004bf41b3a0e4ce144f095.exeC:\Users\Admin\AppData\Local\Temp\1f3d4cf5ae004bf41b3a0e4ce144f095.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5bc80040784546bfa266155145e0eb733
SHA1dfe230806e7d4e559d5328467650a2a0901f67cc
SHA2567a882306be4e0207e122642ca193d06c2f69d5d96d6f4b39f8e8be499831d211
SHA5124788dbca19a71e64b55ee1f0b254dc2eca1ab6f754aefac5ed6710b83b61fddf4281198beafe129923e317633d754b6e05e177637b1d9fffa7899ea9a087546c