Analysis
-
max time kernel
97s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
125a6d5398475a6eb76f10801f7876a1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
125a6d5398475a6eb76f10801f7876a1.exe
Resource
win10v2004-20231222-en
General
-
Target
125a6d5398475a6eb76f10801f7876a1.exe
-
Size
82KB
-
MD5
125a6d5398475a6eb76f10801f7876a1
-
SHA1
7f82add1b42c095a09ca474c67a5f80ea7b14357
-
SHA256
5cf1b50ec65d14d7a5d2e175b652d488ac741bff36fed2c0146e544dea229477
-
SHA512
6a0dc486884d6434dfdf2e50f45da2fa364737604cb353453cac2a52b32622277c661aa9d3695a4f24bfc35e4dc275018b52b6ab6a5b84d5aaac2ee5f42af323
-
SSDEEP
1536:ErH/hDIPjP198ffk8yrN0DZoEkhJ1zNRpn9albB7KUA9HwFHGcQomtUR/alhfe:SKPj2fwr/FhJpNRpn926l12/e2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4928 125a6d5398475a6eb76f10801f7876a1.exe -
Executes dropped EXE 1 IoCs
pid Process 4928 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4592 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4592 125a6d5398475a6eb76f10801f7876a1.exe 4928 125a6d5398475a6eb76f10801f7876a1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4928 4592 125a6d5398475a6eb76f10801f7876a1.exe 57 PID 4592 wrote to memory of 4928 4592 125a6d5398475a6eb76f10801f7876a1.exe 57 PID 4592 wrote to memory of 4928 4592 125a6d5398475a6eb76f10801f7876a1.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe"C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exeC:\Users\Admin\AppData\Local\Temp\125a6d5398475a6eb76f10801f7876a1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b5108e3989a9fd8be5514f25208439a0
SHA1223756b99d7c56805be7d0170bfa168cc182afe6
SHA256d50ae6f87c85faed13fade2f7807c3edfef600e9da5fd3fb8f79ccf4a1d26f4e
SHA51277b6abe88b830896ac423325a04009cfa1ee55561e17e1a7f1985039671d438c495273b86f76f01a2ce0d54cd0a8021eda8b5cd54270bc199faa7776e828bd26