Analysis
-
max time kernel
143s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
185c3e0d7cad2ca8362a32938581e210.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
185c3e0d7cad2ca8362a32938581e210.exe
Resource
win10v2004-20231215-en
General
-
Target
185c3e0d7cad2ca8362a32938581e210.exe
-
Size
84KB
-
MD5
185c3e0d7cad2ca8362a32938581e210
-
SHA1
765b3588eabdd8d711473e6e0e02bafda57f1979
-
SHA256
dc0ff115bd393cdb9ddf6d70b25d7edcbfb49b320feb05e47a803b8b0104e38a
-
SHA512
b4a59283aece2e83b5ab812c910e9e1106858dabe9aca6623a374163bc2970fecb8ac230183db50a9875a8b5c47d69dd0b632c7a0883260beed1e48909f2a380
-
SSDEEP
1536:x+0jUThcbiJC4c+VqMBxFvIFtLFYG7sGmnRbhnDN6ex9Sv6Su2kz0pzK+G2muepp:x+AUAiJCcAM/FvIHLFYtbhnDN1x906b9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3892 185c3e0d7cad2ca8362a32938581e210.exe -
Executes dropped EXE 1 IoCs
pid Process 3892 185c3e0d7cad2ca8362a32938581e210.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3912 185c3e0d7cad2ca8362a32938581e210.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3912 185c3e0d7cad2ca8362a32938581e210.exe 3892 185c3e0d7cad2ca8362a32938581e210.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3892 3912 185c3e0d7cad2ca8362a32938581e210.exe 47 PID 3912 wrote to memory of 3892 3912 185c3e0d7cad2ca8362a32938581e210.exe 47 PID 3912 wrote to memory of 3892 3912 185c3e0d7cad2ca8362a32938581e210.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\185c3e0d7cad2ca8362a32938581e210.exe"C:\Users\Admin\AppData\Local\Temp\185c3e0d7cad2ca8362a32938581e210.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\185c3e0d7cad2ca8362a32938581e210.exeC:\Users\Admin\AppData\Local\Temp\185c3e0d7cad2ca8362a32938581e210.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD538d07ee613d8f2479c42556a22c7ed51
SHA181775d31f28cccb9d28fcb83e58da9468c847a4c
SHA256fab8a5bc5691bc9f87d8709a8be251ffdd59c1f725e946ab72a5a3db115dc5ab
SHA51281b65216fead2356af9537aa613ff330755844f15b6091eb42662581966e35e9044d535220a2baa3d4d1b43cca471f23b5d8136fdd24d1517f95889e66990e0b