Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:04
Behavioral task
behavioral1
Sample
27d68a88d4dddf6a051b28e91e60c931.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27d68a88d4dddf6a051b28e91e60c931.exe
Resource
win10v2004-20231222-en
General
-
Target
27d68a88d4dddf6a051b28e91e60c931.exe
-
Size
56KB
-
MD5
27d68a88d4dddf6a051b28e91e60c931
-
SHA1
9f7e04e39db4afa931baab558f14a6c72a495c30
-
SHA256
f3a5dd12b6f5835dd56b2d15e9cf973b57e8dd3ca78599c615bc20a86a659673
-
SHA512
f38ad04d516611d2b91d017b36d12765a4dc0487d38100438fbf01afd4387a7cd51f82c42e6854ab1c093fb7dcd92fbd34736074066901aa7a2a319f1396c460
-
SSDEEP
768:tGR5iJWve3oT7KXf1Rf5efcZDU8x1ve3/zWAADw2t2NEV7D+Za7IPJx745LJ/IoG:ty50Wvgf1zZHjm3KtFxg4/tYfNn3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 27d68a88d4dddf6a051b28e91e60c931.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 27d68a88d4dddf6a051b28e91e60c931.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 27d68a88d4dddf6a051b28e91e60c931.exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000a000000012238-10.dat upx behavioral1/memory/2204-12-0x00000000002E0000-0x000000000031A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 27d68a88d4dddf6a051b28e91e60c931.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 27d68a88d4dddf6a051b28e91e60c931.exe 2840 27d68a88d4dddf6a051b28e91e60c931.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2840 2204 27d68a88d4dddf6a051b28e91e60c931.exe 29 PID 2204 wrote to memory of 2840 2204 27d68a88d4dddf6a051b28e91e60c931.exe 29 PID 2204 wrote to memory of 2840 2204 27d68a88d4dddf6a051b28e91e60c931.exe 29 PID 2204 wrote to memory of 2840 2204 27d68a88d4dddf6a051b28e91e60c931.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe"C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exeC:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5cd6a0e62f27ef317386bb8c95595df21
SHA160993f7225ae7d111011784df52c8cdd1019a437
SHA256fd6203ec568ed03104cdd9675ab427942c0d8e48c036422111e6faa7f8824257
SHA51281ddcb96e294a0569b5590bc57bd9d4d8aa438d3e3eacd8c34bd383a64cb6050c51691fe483f654647d301c5f2b4c4bb3fd3c7ef011714972671aa0aacb92d46