Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
1ad764f84519935bf52aefdc081b47cc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ad764f84519935bf52aefdc081b47cc.exe
Resource
win10v2004-20231215-en
General
-
Target
1ad764f84519935bf52aefdc081b47cc.exe
-
Size
57KB
-
MD5
1ad764f84519935bf52aefdc081b47cc
-
SHA1
0d8a24f7d114cb80a0413ddbd4d87a619e36ba1c
-
SHA256
78c4daf15dd77fe734f18737d9cbe0e99a4809a11dbc882bf608bb86a0408a3a
-
SHA512
1a099a330f8a318f9306cd9b588f02d5f1ab1d4e2f752a697aa384910f8b117fd04629d084173325c32ea3e4e5983e56e60e16b89c5c74f76849c002b3100b6d
-
SSDEEP
768:41V9Qs9bXN8Nr+9d1s3inDFl453C6yzh4MSb+o70jBlM/QEzOlu5Fl90SOj:4hVzWQuiDF+lC6yHSqKKB5VuV9Gj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 1ad764f84519935bf52aefdc081b47cc.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 1ad764f84519935bf52aefdc081b47cc.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 1ad764f84519935bf52aefdc081b47cc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 1ad764f84519935bf52aefdc081b47cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2872 1ad764f84519935bf52aefdc081b47cc.exe 3060 1ad764f84519935bf52aefdc081b47cc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3060 2872 1ad764f84519935bf52aefdc081b47cc.exe 19 PID 2872 wrote to memory of 3060 2872 1ad764f84519935bf52aefdc081b47cc.exe 19 PID 2872 wrote to memory of 3060 2872 1ad764f84519935bf52aefdc081b47cc.exe 19 PID 2872 wrote to memory of 3060 2872 1ad764f84519935bf52aefdc081b47cc.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad764f84519935bf52aefdc081b47cc.exe"C:\Users\Admin\AppData\Local\Temp\1ad764f84519935bf52aefdc081b47cc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1ad764f84519935bf52aefdc081b47cc.exeC:\Users\Admin\AppData\Local\Temp\1ad764f84519935bf52aefdc081b47cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5db0493611904a603d9685051819a1c9a
SHA12c3ac3da57df3b7b8cb898c179f2f4c5ca570170
SHA2568c55c928c0ce8f33eb90af664d99919a0826249c1728cf58c71472a4833c46fe
SHA512084f8d8e301b9d99247e9891a71c8a246837602ef41af5522f91ba7670800edef7434c81ca50f67edf534f03b2c1a4b833105b42ddb5e810e6f6583602b7b55b