Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 11:29
Behavioral task
behavioral1
Sample
1adc2d4723da59f107adaadb69102a89.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1adc2d4723da59f107adaadb69102a89.exe
Resource
win10v2004-20231222-en
General
-
Target
1adc2d4723da59f107adaadb69102a89.exe
-
Size
1.3MB
-
MD5
1adc2d4723da59f107adaadb69102a89
-
SHA1
e046901d18f40f64dfbb9706f801508bdb3c204c
-
SHA256
2f45db194bcff2a8476adb10a2d481cedf03e354be80f19f5181e6d55178616d
-
SHA512
195515b6a9829c8c80001c29265ee67d26b47d2631d917335caada1da65fcd073ea550c87e80312abbde03fc9bad03f92b74b54ade7b286f92bbdb5fc41f0b78
-
SSDEEP
24576:oGP65mkkuY5ZbHwMJvGTyB6loHlf22wxI0rGZ7jHs9CDKCevG:cxdYTwCvca6qAxIfM9CDK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 1adc2d4723da59f107adaadb69102a89.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 1adc2d4723da59f107adaadb69102a89.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 1adc2d4723da59f107adaadb69102a89.exe -
resource yara_rule behavioral1/memory/2212-1-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x0009000000014120-14.dat upx behavioral1/files/0x0009000000014120-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2212 1adc2d4723da59f107adaadb69102a89.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2212 1adc2d4723da59f107adaadb69102a89.exe 2388 1adc2d4723da59f107adaadb69102a89.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2388 2212 1adc2d4723da59f107adaadb69102a89.exe 28 PID 2212 wrote to memory of 2388 2212 1adc2d4723da59f107adaadb69102a89.exe 28 PID 2212 wrote to memory of 2388 2212 1adc2d4723da59f107adaadb69102a89.exe 28 PID 2212 wrote to memory of 2388 2212 1adc2d4723da59f107adaadb69102a89.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1adc2d4723da59f107adaadb69102a89.exe"C:\Users\Admin\AppData\Local\Temp\1adc2d4723da59f107adaadb69102a89.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\1adc2d4723da59f107adaadb69102a89.exeC:\Users\Admin\AppData\Local\Temp\1adc2d4723da59f107adaadb69102a89.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD55176a978ffd711e7bf81bd6429049b78
SHA11c6521ad8a67c4ac25438a8f4bafdfd9951f3d23
SHA2561270e9f484e891b3f4e7220089c3de7a816432802d5dc5060ced9f8a14ef62c1
SHA512cca2e368625633aa7c37c09c2b957c0862405e4b29f0c17b35c821b36d93ba72635ab0a95fe925c57e427e6e8201ce96c6d5af749c85ec41309130e1c543b6de
-
Filesize
391KB
MD54f773b293a64a51d0047eba107a921f3
SHA1e443706e997633ecc37cfab449e81bfa263360d2
SHA2567d9acb021bca30d1872488a508bd4ee91ed86d20a96b8a64c2caaa78bad8f662
SHA5121eeed39f6d7bad4923dd2bc0e332dabe78124ff277120613e4708316a302b242b1ab2d26cab9987c5c4f9dd8c29b471d175bd9bf78b9294ac75a699aa9682ade