Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 15:12
Static task
static1
Behavioral task
behavioral1
Sample
28503e574ef1a298de29ded884c319ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28503e574ef1a298de29ded884c319ed.exe
Resource
win10v2004-20231222-en
General
-
Target
28503e574ef1a298de29ded884c319ed.exe
-
Size
84KB
-
MD5
28503e574ef1a298de29ded884c319ed
-
SHA1
3f383fa49ac6ebee8200d14c901de36e3960ded4
-
SHA256
d47424fbeeb8e6742748e9091a13074f3be8e693bf0c8eef329fa45f937c8a28
-
SHA512
054bebb04f09e30297132b4f436c94d764867c4b0d58470747a7f0351e2bec7530b166e0ed5e0723d04dc4dcd0a94358e04d2540c2dde1ec646fb90dde73aeea
-
SSDEEP
1536:Q6UW2fbhn4pq8aKRCMo4Rz9f+7SIDFmrLo7vKJKa7wh/iCXuhc38z:QBV4E8XcT4Rz9GFlvK4RVhehc3g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4340 28503e574ef1a298de29ded884c319ed.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 28503e574ef1a298de29ded884c319ed.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 516 28503e574ef1a298de29ded884c319ed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 516 28503e574ef1a298de29ded884c319ed.exe 4340 28503e574ef1a298de29ded884c319ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 516 wrote to memory of 4340 516 28503e574ef1a298de29ded884c319ed.exe 22 PID 516 wrote to memory of 4340 516 28503e574ef1a298de29ded884c319ed.exe 22 PID 516 wrote to memory of 4340 516 28503e574ef1a298de29ded884c319ed.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\28503e574ef1a298de29ded884c319ed.exe"C:\Users\Admin\AppData\Local\Temp\28503e574ef1a298de29ded884c319ed.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\28503e574ef1a298de29ded884c319ed.exeC:\Users\Admin\AppData\Local\Temp\28503e574ef1a298de29ded884c319ed.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5b8a01352b073ef415240f97626e20762
SHA1f1f81a9c9896116600ba0347ac57256e199af49f
SHA256bae18b7cfa9e0216270144c539a3654c4bdc798ace492ae2fbad4c167e41b06f
SHA512731554f7769ded9c22ba0b44decbf3b49d5ef4cfc411a0814e695741b8a745892a2ab628ed8b169a9bb5c05745be0c4fefd470320fd72e184631443fd5ef1761