Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:55
Static task
static1
Behavioral task
behavioral1
Sample
105c47de6967dd09f5220530bd941638.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
105c47de6967dd09f5220530bd941638.exe
Resource
win10v2004-20231215-en
General
-
Target
105c47de6967dd09f5220530bd941638.exe
-
Size
92KB
-
MD5
105c47de6967dd09f5220530bd941638
-
SHA1
696d7faa2c558fb1594151e5452b4bbb04dc6f01
-
SHA256
8396c106cd50d004687dc63efbc8b20dbe8231acfde6ddc2a0adb055a27e499b
-
SHA512
6997be091c6cffe5127fb379b3b445ca6d12e33e003130b01c81812962df290cd1b7fa6325a82dc57fce27fe84d17f838b9496639cb91c3f5bafbd9559bdb145
-
SSDEEP
1536:UQugXa8YHwHgo4Ot/aA/7KzAX//+OHrbut3iPnGUFLl4EBKPwHHL0Zdjsa:LxyHigo4caA+UOOnuB+GUFx4EBKOwZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 105c47de6967dd09f5220530bd941638.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 105c47de6967dd09f5220530bd941638.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 105c47de6967dd09f5220530bd941638.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1656 105c47de6967dd09f5220530bd941638.exe 4756 105c47de6967dd09f5220530bd941638.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4756 1656 105c47de6967dd09f5220530bd941638.exe 89 PID 1656 wrote to memory of 4756 1656 105c47de6967dd09f5220530bd941638.exe 89 PID 1656 wrote to memory of 4756 1656 105c47de6967dd09f5220530bd941638.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\105c47de6967dd09f5220530bd941638.exe"C:\Users\Admin\AppData\Local\Temp\105c47de6967dd09f5220530bd941638.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\105c47de6967dd09f5220530bd941638.exeC:\Users\Admin\AppData\Local\Temp\105c47de6967dd09f5220530bd941638.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD593d6e9328c2f055b6e3640e67a44c1ca
SHA190c213ca15f49fb7f9855950865a24dde0a7ad01
SHA256761c57b8516b6e5c994d372bf31e6d4e43bfa288cbed0bec4d95c7a82092733b
SHA5127bdeee65d2c61392126af190e1c8a9c012aa87cd23ce819f3e4d5a06cda34cc9eac5c0c06eeb6f91b50044466aa29d1e781d6f67ee6b0d64ca494f910f52f343