Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
026df35843c369ad21762b8fe93d226c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
026df35843c369ad21762b8fe93d226c.exe
Resource
win10v2004-20231215-en
General
-
Target
026df35843c369ad21762b8fe93d226c.exe
-
Size
82KB
-
MD5
026df35843c369ad21762b8fe93d226c
-
SHA1
59835e96923c6fc2d5de6f1cbc1cc36967ee3aee
-
SHA256
1b9b75c08c5d3f72ea7c7555547dc8d182f8d5147f98a8ea8a519f71c01785a8
-
SHA512
dfd67d0626a6dc21dcaf27d9b62d0dc77d1ce4c74ed75bf0ea5e6e68c7cc745f7b911834f6eaa10593240c38d4b85d6d7030fdd8ff13eb7a9927585c60c4a433
-
SSDEEP
1536:SHRtX5P9EM0yGJFtHLmOYZzJL01Q24Wd98qHma76wlsUXo2mwLOEB:QVtKM0yGJFtobL01t4alHm+5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 026df35843c369ad21762b8fe93d226c.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 026df35843c369ad21762b8fe93d226c.exe -
Loads dropped DLL 1 IoCs
pid Process 1180 026df35843c369ad21762b8fe93d226c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1180 026df35843c369ad21762b8fe93d226c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1180 026df35843c369ad21762b8fe93d226c.exe 3052 026df35843c369ad21762b8fe93d226c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3052 1180 026df35843c369ad21762b8fe93d226c.exe 29 PID 1180 wrote to memory of 3052 1180 026df35843c369ad21762b8fe93d226c.exe 29 PID 1180 wrote to memory of 3052 1180 026df35843c369ad21762b8fe93d226c.exe 29 PID 1180 wrote to memory of 3052 1180 026df35843c369ad21762b8fe93d226c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe"C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exeC:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD59ee18c1c92de8436868719fe8056294c
SHA199fe4ce32df8c02c90c30555d58cc8f42908dd36
SHA25615338b46280a86b870a668946086174224db159659b74ade92875db510ec1d41
SHA512c6e1be54f7d7f50ba2ebf291b0a56f7e21057cda150f503272709c735c78d9cbe9cd165a6ff6b3edd1b32d7ccb6257c5c8072d7ec16b7ab0e0cc36a998c12b17