Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:35
Static task
static1
Behavioral task
behavioral1
Sample
125a6d5398475a6eb76f10801f7876a1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
125a6d5398475a6eb76f10801f7876a1.exe
Resource
win10v2004-20231222-en
General
-
Target
125a6d5398475a6eb76f10801f7876a1.exe
-
Size
82KB
-
MD5
125a6d5398475a6eb76f10801f7876a1
-
SHA1
7f82add1b42c095a09ca474c67a5f80ea7b14357
-
SHA256
5cf1b50ec65d14d7a5d2e175b652d488ac741bff36fed2c0146e544dea229477
-
SHA512
6a0dc486884d6434dfdf2e50f45da2fa364737604cb353453cac2a52b32622277c661aa9d3695a4f24bfc35e4dc275018b52b6ab6a5b84d5aaac2ee5f42af323
-
SSDEEP
1536:ErH/hDIPjP198ffk8yrN0DZoEkhJ1zNRpn9albB7KUA9HwFHGcQomtUR/alhfe:SKPj2fwr/FhJpNRpn926l12/e2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 940 125a6d5398475a6eb76f10801f7876a1.exe -
Executes dropped EXE 1 IoCs
pid Process 940 125a6d5398475a6eb76f10801f7876a1.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2380 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 125a6d5398475a6eb76f10801f7876a1.exe 940 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 940 2380 125a6d5398475a6eb76f10801f7876a1.exe 29 PID 2380 wrote to memory of 940 2380 125a6d5398475a6eb76f10801f7876a1.exe 29 PID 2380 wrote to memory of 940 2380 125a6d5398475a6eb76f10801f7876a1.exe 29 PID 2380 wrote to memory of 940 2380 125a6d5398475a6eb76f10801f7876a1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe"C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exeC:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56e879cd9ff1f5cf5627b895ec811fefb
SHA15f81934d192fa9da18d3b1682e597dddeaefba45
SHA25616e4ae980fdeb90b53f71af8beda0d6e7d2feba21d4666eee7762fa7c0bef37d
SHA512edd44ce0f1fd8e7bec584f52500fc4db6ba0d6612c1e4e9c30dce56d4f6b37047b10e05f2396ec15838531e312969b0fd14dff4a0df717c070decb5e2d3587b0