Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 06:12
Static task
static1
Behavioral task
behavioral1
Sample
0abb9e3f74a8a601810269a9bd7d5b27.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0abb9e3f74a8a601810269a9bd7d5b27.exe
Resource
win10v2004-20231215-en
General
-
Target
0abb9e3f74a8a601810269a9bd7d5b27.exe
-
Size
84KB
-
MD5
0abb9e3f74a8a601810269a9bd7d5b27
-
SHA1
a0c216d2f8fd5d403a58038e283580c47a810159
-
SHA256
e2f4043b5fba52328f3b08fe7b18583d0980c8d0f2eeb436938fcebaab0ed2ca
-
SHA512
24829d8d4377f463eb6462a9848c1afd5a553269bd3ea65bf3491baa108596e2d3c00cd8143d3fcdf2b8643fca7934fc08a7b7379e488b85a08d1f44e970e5dc
-
SSDEEP
1536:DjSbpqnBiksIS6VMgDAIc+c3PndvPRo1ZDcPTXge3P9+C8fUibL/bIujm5I:DjSlqnBlDchN3Pndv0Sr3P7FibL5MI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3152 0abb9e3f74a8a601810269a9bd7d5b27.exe -
Executes dropped EXE 1 IoCs
pid Process 3152 0abb9e3f74a8a601810269a9bd7d5b27.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4052 0abb9e3f74a8a601810269a9bd7d5b27.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4052 0abb9e3f74a8a601810269a9bd7d5b27.exe 3152 0abb9e3f74a8a601810269a9bd7d5b27.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3152 4052 0abb9e3f74a8a601810269a9bd7d5b27.exe 20 PID 4052 wrote to memory of 3152 4052 0abb9e3f74a8a601810269a9bd7d5b27.exe 20 PID 4052 wrote to memory of 3152 4052 0abb9e3f74a8a601810269a9bd7d5b27.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\0abb9e3f74a8a601810269a9bd7d5b27.exe"C:\Users\Admin\AppData\Local\Temp\0abb9e3f74a8a601810269a9bd7d5b27.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\0abb9e3f74a8a601810269a9bd7d5b27.exeC:\Users\Admin\AppData\Local\Temp\0abb9e3f74a8a601810269a9bd7d5b27.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3152
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD583878bbec818b5c84e6a83ea920477df
SHA19ce232b746909a0271b47a43e969bc39e2f7b2d4
SHA256ad97f2d72b2d6c17ea74123f2cfe2fba0223280214cedbf54f458f51ffc34cce
SHA512cf9802e5047ea29150f7473e1fa1da5ea80887e72629d2d146d6343408cc2e9643a358d2008b841fd9cbfa45afea91a47c658665c8d433c667ee205a63edee9d