Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
1fec9dfaed594a736471e13958ec9346.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fec9dfaed594a736471e13958ec9346.exe
Resource
win10v2004-20231215-en
General
-
Target
1fec9dfaed594a736471e13958ec9346.exe
-
Size
82KB
-
MD5
1fec9dfaed594a736471e13958ec9346
-
SHA1
d997ba8f5a3983b3a56c3d1aa1df7bf6cddf63f9
-
SHA256
ae1fb518e14d01bbf8f2fe7a5c164f0c646bc93a357d2ea92595da3025cd934b
-
SHA512
92c4a1aa8b308ff7663010c34dbf89ca2ed8d4a186b9ad2718d54ffedc3d36600ca154da955a885a1976a8f0ecef4a70e14eb8047fa773afccb8e629258a15ca
-
SSDEEP
1536:TAepadnUeor4mqG1tocavptztQ5kJPMcQ0A7XhKKxQCR5f80M8B64t4U:p06eokR0aVvR+qPq0XOR5xMe6DU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 1fec9dfaed594a736471e13958ec9346.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 1fec9dfaed594a736471e13958ec9346.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 1fec9dfaed594a736471e13958ec9346.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 1fec9dfaed594a736471e13958ec9346.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2468 1fec9dfaed594a736471e13958ec9346.exe 2736 1fec9dfaed594a736471e13958ec9346.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2736 2468 1fec9dfaed594a736471e13958ec9346.exe 29 PID 2468 wrote to memory of 2736 2468 1fec9dfaed594a736471e13958ec9346.exe 29 PID 2468 wrote to memory of 2736 2468 1fec9dfaed594a736471e13958ec9346.exe 29 PID 2468 wrote to memory of 2736 2468 1fec9dfaed594a736471e13958ec9346.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fec9dfaed594a736471e13958ec9346.exe"C:\Users\Admin\AppData\Local\Temp\1fec9dfaed594a736471e13958ec9346.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\1fec9dfaed594a736471e13958ec9346.exeC:\Users\Admin\AppData\Local\Temp\1fec9dfaed594a736471e13958ec9346.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5dfd58987dd8a85efa77208662fb1a489
SHA1d7205611e344ea31422727f5e4d5507297434368
SHA256a15ae40fcaf4035f69887643f85d7ab795614b069253cd228c5b7da597d5bafb
SHA512e90adf9f7b37f48f7570095450ebfd593d1415acf65c4a64ffa00bf67896fb3a2c6da977af7db3b599dfb3a24e3044cc7bd74b6db55f21a5d1571144f848d03e