Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
119c8c34197a1b1b1b0b8a002d2d37d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
119c8c34197a1b1b1b0b8a002d2d37d6.exe
Resource
win10v2004-20231215-en
General
-
Target
119c8c34197a1b1b1b0b8a002d2d37d6.exe
-
Size
57KB
-
MD5
119c8c34197a1b1b1b0b8a002d2d37d6
-
SHA1
32248f6a21fdbab3150dcbe91e761a5cca65a4bd
-
SHA256
ea3e818b4ccacd56e876145e0011ff4a451f7c95ca4ebcea897289f96650ce03
-
SHA512
4d258f271fbfdeaea7e8cb212c336e162dbaeab0d1e0e770448147cdac6008d8c3dd0efac4cbe54078d65e2f1aacb5e5bb5575b336a53c4fc1956e556347eea1
-
SSDEEP
768:JPjJtYqJHC0qBkXvQz9j67RarlR10hHkBH5OWUmy54/QqxBfRZHvo7cSf2TL:JPl+qxVA9GRtkF5OWUH5+BJZwoP/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 119c8c34197a1b1b1b0b8a002d2d37d6.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 119c8c34197a1b1b1b0b8a002d2d37d6.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe 2392 119c8c34197a1b1b1b0b8a002d2d37d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2392 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe 16 PID 2100 wrote to memory of 2392 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe 16 PID 2100 wrote to memory of 2392 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe 16 PID 2100 wrote to memory of 2392 2100 119c8c34197a1b1b1b0b8a002d2d37d6.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\119c8c34197a1b1b1b0b8a002d2d37d6.exe"C:\Users\Admin\AppData\Local\Temp\119c8c34197a1b1b1b0b8a002d2d37d6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\119c8c34197a1b1b1b0b8a002d2d37d6.exeC:\Users\Admin\AppData\Local\Temp\119c8c34197a1b1b1b0b8a002d2d37d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5fed51447a90e6e65d1c7304958d004b8
SHA16c0cdf2002de7f0adf16df5966b9932082c20cff
SHA256c42809d4c5bd90bfe1f20e11085e4c652c203bf56ccd4965db93b61e4e275b02
SHA512f991313871d1fe42c564c80747128f3026036c025dad772768414571bb6f3f7c699576b238e581431476552539e4b70292893be4d94f24700cffdb97660129e5