Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
0567f5a908f8c180808f7247a354924a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0567f5a908f8c180808f7247a354924a.exe
Resource
win10v2004-20231222-en
General
-
Target
0567f5a908f8c180808f7247a354924a.exe
-
Size
84KB
-
MD5
0567f5a908f8c180808f7247a354924a
-
SHA1
ad6980bcf1b7b8f52b0922dd7fbb9e32d60fda5d
-
SHA256
6b9f3ec904cbd1034891706ff97da8d414194a7515f0d591b1395592822925bc
-
SHA512
1210732058d260c68e611ac34efd9235f3a950d930d7f5ce2b8399b6d6df3e2bd366d40169891f7ddfe140aa0ecc6410f56935e170b57a5d732f57a7da144222
-
SSDEEP
1536:GLbXem+3ApnneANpcwr6P6a69gc/AWcAsvQlBULsaW:yTe1ApnneANpUiaCgwlr4Yb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 0567f5a908f8c180808f7247a354924a.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 0567f5a908f8c180808f7247a354924a.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 0567f5a908f8c180808f7247a354924a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 0567f5a908f8c180808f7247a354924a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 0567f5a908f8c180808f7247a354924a.exe 3008 0567f5a908f8c180808f7247a354924a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3008 2976 0567f5a908f8c180808f7247a354924a.exe 17 PID 2976 wrote to memory of 3008 2976 0567f5a908f8c180808f7247a354924a.exe 17 PID 2976 wrote to memory of 3008 2976 0567f5a908f8c180808f7247a354924a.exe 17 PID 2976 wrote to memory of 3008 2976 0567f5a908f8c180808f7247a354924a.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0567f5a908f8c180808f7247a354924a.exe"C:\Users\Admin\AppData\Local\Temp\0567f5a908f8c180808f7247a354924a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\0567f5a908f8c180808f7247a354924a.exeC:\Users\Admin\AppData\Local\Temp\0567f5a908f8c180808f7247a354924a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD578972b1c7d0ff80aa8d65f2200bf39e5
SHA11027ce7006e692040204a45ba5041e99908c29b9
SHA256f21fbdec09515114dd5cfc08cd4deacdab0bc279bc717d6b3e3a31f22b39ab57
SHA512af4238e56b8f46b4f1f75598a48c7db400a2d5918c5cff954ba7de82640dd0e1c31d0bf000b60930a9d8aceffeadc03281d47f7260796cf98cebeecf13117585