Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:17

General

  • Target

    026df35843c369ad21762b8fe93d226c.exe

  • Size

    82KB

  • MD5

    026df35843c369ad21762b8fe93d226c

  • SHA1

    59835e96923c6fc2d5de6f1cbc1cc36967ee3aee

  • SHA256

    1b9b75c08c5d3f72ea7c7555547dc8d182f8d5147f98a8ea8a519f71c01785a8

  • SHA512

    dfd67d0626a6dc21dcaf27d9b62d0dc77d1ce4c74ed75bf0ea5e6e68c7cc745f7b911834f6eaa10593240c38d4b85d6d7030fdd8ff13eb7a9927585c60c4a433

  • SSDEEP

    1536:SHRtX5P9EM0yGJFtHLmOYZzJL01Q24Wd98qHma76wlsUXo2mwLOEB:QVtKM0yGJFtobL01t4alHm+5B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe
    "C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe
      C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3052

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\026df35843c369ad21762b8fe93d226c.exe

          Filesize

          82KB

          MD5

          9ee18c1c92de8436868719fe8056294c

          SHA1

          99fe4ce32df8c02c90c30555d58cc8f42908dd36

          SHA256

          15338b46280a86b870a668946086174224db159659b74ade92875db510ec1d41

          SHA512

          c6e1be54f7d7f50ba2ebf291b0a56f7e21057cda150f503272709c735c78d9cbe9cd165a6ff6b3edd1b32d7ccb6257c5c8072d7ec16b7ab0e0cc36a998c12b17

        • memory/1180-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1180-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1180-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

          Filesize

          188KB

        • memory/1180-15-0x0000000000310000-0x000000000033F000-memory.dmp

          Filesize

          188KB

        • memory/1180-14-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3052-17-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3052-18-0x00000000001D0000-0x00000000001FF000-memory.dmp

          Filesize

          188KB

        • memory/3052-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3052-25-0x0000000000220000-0x000000000023B000-memory.dmp

          Filesize

          108KB