Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
0a7cee53979c2018e4fa90418ff9d987.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a7cee53979c2018e4fa90418ff9d987.exe
Resource
win10v2004-20231215-en
General
-
Target
0a7cee53979c2018e4fa90418ff9d987.exe
-
Size
82KB
-
MD5
0a7cee53979c2018e4fa90418ff9d987
-
SHA1
450dfe5852a3445420b40d52940d106cb3a0d8f9
-
SHA256
5461f9097de1f6905fc290c5df42d1e6322b0a0e786d17b1581172f138d885ab
-
SHA512
656e12ec8634ef5dcc77e4cd66d465dca1fc045f3c1fee4f1707756f5eee56d626ba4715988f5ca5c1708b3d7554195c4edc6612b7cd800ac79a38cdd1005ec0
-
SSDEEP
1536:UoE52sCXUj/viOeA32W1CenTsLiWPHhdnAV1I2:Vfi6OeA32OC+65dnAV1N
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4516 0a7cee53979c2018e4fa90418ff9d987.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2820 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2820 0a7cee53979c2018e4fa90418ff9d987.exe 4516 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4516 2820 0a7cee53979c2018e4fa90418ff9d987.exe 22 PID 2820 wrote to memory of 4516 2820 0a7cee53979c2018e4fa90418ff9d987.exe 22 PID 2820 wrote to memory of 4516 2820 0a7cee53979c2018e4fa90418ff9d987.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe"C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exeC:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD561dd69bd1a792573fbca5b5e162d9d4f
SHA1076aba0ecbf1d36774e2fcb64e118c30c96dddc7
SHA25697b8ff20c02b7ed9da7caa35f473d154e2fb3579474f6573a5f9763a695cd625
SHA512eec09ffdc8fec84c03096199dbe83cbf78e0cde4abd54fcf4efba1db048b16a08b54cce34f30b1b290f2ca14daf14218b69f04136f16d5b7799d382849ce3ba7