Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 15:04
Behavioral task
behavioral1
Sample
27d68a88d4dddf6a051b28e91e60c931.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27d68a88d4dddf6a051b28e91e60c931.exe
Resource
win10v2004-20231222-en
General
-
Target
27d68a88d4dddf6a051b28e91e60c931.exe
-
Size
56KB
-
MD5
27d68a88d4dddf6a051b28e91e60c931
-
SHA1
9f7e04e39db4afa931baab558f14a6c72a495c30
-
SHA256
f3a5dd12b6f5835dd56b2d15e9cf973b57e8dd3ca78599c615bc20a86a659673
-
SHA512
f38ad04d516611d2b91d017b36d12765a4dc0487d38100438fbf01afd4387a7cd51f82c42e6854ab1c093fb7dcd92fbd34736074066901aa7a2a319f1396c460
-
SSDEEP
768:tGR5iJWve3oT7KXf1Rf5efcZDU8x1ve3/zWAADw2t2NEV7D+Za7IPJx745LJ/IoG:ty50Wvgf1zZHjm3KtFxg4/tYfNn3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 27d68a88d4dddf6a051b28e91e60c931.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 27d68a88d4dddf6a051b28e91e60c931.exe -
resource yara_rule behavioral2/memory/3740-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2028-13-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000023217-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3740 27d68a88d4dddf6a051b28e91e60c931.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3740 27d68a88d4dddf6a051b28e91e60c931.exe 2028 27d68a88d4dddf6a051b28e91e60c931.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2028 3740 27d68a88d4dddf6a051b28e91e60c931.exe 20 PID 3740 wrote to memory of 2028 3740 27d68a88d4dddf6a051b28e91e60c931.exe 20 PID 3740 wrote to memory of 2028 3740 27d68a88d4dddf6a051b28e91e60c931.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exeC:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2028
-
C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe"C:\Users\Admin\AppData\Local\Temp\27d68a88d4dddf6a051b28e91e60c931.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3740
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD587eccb668243f19861498d438ded9044
SHA139f49fca120582c889c2e5488f9957d73e03ca45
SHA256439b34598f1b5604f98f78ac81a51a6692a3f5dcd23384af0071fb0162f925ea
SHA5125b604c9551fc4585ec34a759b814493eba6b39952fdcb478bc3c790e5bdd1e0b888a19f405a53fc0877c5198cc6ebc0783aef6b5b081b65dc66fee2ef801b9ad