Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
02c5bd02cee8a22c94b2ce87a673b621.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02c5bd02cee8a22c94b2ce87a673b621.exe
Resource
win10v2004-20231215-en
General
-
Target
02c5bd02cee8a22c94b2ce87a673b621.exe
-
Size
84KB
-
MD5
02c5bd02cee8a22c94b2ce87a673b621
-
SHA1
293b41ea8439da1f9b46165db2804f6aadf13762
-
SHA256
1bc54eb876e520faa4c9d87a89d1da762d11ff136e0c2bcc29580b0d13076af3
-
SHA512
9b0d82a6e09cc79a0c2adfc793a829f6aa3ce156fc873864149a592728e3854e615592591dbacf930709a40fd2e01fc6747ce0d8adb0c8091c6f3c7f9ac5985d
-
SSDEEP
1536:hjPl76lO35CU3hRiPrwJF/SDSr2kIdg7G2ky7Pl8aFgpUZZIINc3HIi937:Sly5T3htNzGaG2k8NFeAZwXT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 02c5bd02cee8a22c94b2ce87a673b621.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 02c5bd02cee8a22c94b2ce87a673b621.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 02c5bd02cee8a22c94b2ce87a673b621.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 02c5bd02cee8a22c94b2ce87a673b621.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2716 02c5bd02cee8a22c94b2ce87a673b621.exe 2720 02c5bd02cee8a22c94b2ce87a673b621.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2720 2716 02c5bd02cee8a22c94b2ce87a673b621.exe 31 PID 2716 wrote to memory of 2720 2716 02c5bd02cee8a22c94b2ce87a673b621.exe 31 PID 2716 wrote to memory of 2720 2716 02c5bd02cee8a22c94b2ce87a673b621.exe 31 PID 2716 wrote to memory of 2720 2716 02c5bd02cee8a22c94b2ce87a673b621.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe"C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exeC:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD584b580a61eb3cf10871b16449db69a30
SHA1871282ae83d8adbe638301aa0eed75000d326728
SHA256fae21de035d28def0d7a1367ccd256e055516e604101c000fc252afe98084ebd
SHA5123e5ebd370cc7e9e0fdb1018cd7b42ae5b336b4fa171f5df39611a2be69c0638211bc3877d38a308a344d0a1994f8be15855dfc4eb6af871208c011f7c1a75223