Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
2846088296e7a47febf29a7659351b2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2846088296e7a47febf29a7659351b2d.exe
Resource
win10v2004-20231215-en
General
-
Target
2846088296e7a47febf29a7659351b2d.exe
-
Size
84KB
-
MD5
2846088296e7a47febf29a7659351b2d
-
SHA1
a5da1ffb03a14c66959abb158d2dad493c08f311
-
SHA256
5f556e50af4c32935b6d1c000f03504626643cb08049e0b5fe91e821fa6b7ab6
-
SHA512
ffacca3bae1d18af80188eaeab6be77ebb457861714c8dfa65286b6224b74ffb7495b00a4437f6d5f722d1225d2b9fe2c23fba188800c1c9c056845fc608d4c0
-
SSDEEP
1536:+Qg+mfks89/T/E+RzIDMrlaWzij+AtMLxhIWOwUqHVr2CPQ9ghorijg:+MmM9/70WulZEUqNLP4gmz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 2846088296e7a47febf29a7659351b2d.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 2846088296e7a47febf29a7659351b2d.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 2846088296e7a47febf29a7659351b2d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3068 2846088296e7a47febf29a7659351b2d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 2846088296e7a47febf29a7659351b2d.exe 2132 2846088296e7a47febf29a7659351b2d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2132 3068 2846088296e7a47febf29a7659351b2d.exe 29 PID 3068 wrote to memory of 2132 3068 2846088296e7a47febf29a7659351b2d.exe 29 PID 3068 wrote to memory of 2132 3068 2846088296e7a47febf29a7659351b2d.exe 29 PID 3068 wrote to memory of 2132 3068 2846088296e7a47febf29a7659351b2d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2846088296e7a47febf29a7659351b2d.exe"C:\Users\Admin\AppData\Local\Temp\2846088296e7a47febf29a7659351b2d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\2846088296e7a47febf29a7659351b2d.exeC:\Users\Admin\AppData\Local\Temp\2846088296e7a47febf29a7659351b2d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD54740cdf879ae7b7676b53a37192919fb
SHA1f1468ce2f348263a6818988b36f2f33d08b0ff78
SHA256606a0c565ac7036d9f020e9bdd036d70c60c01be46c3c939932a8e6d98c91bb2
SHA51277943f1ca1f04fb5c128c139cbab0e597d7a9b6814e0dfa21f93db6d90f1b1888670106539c0bcde5896a0dae59cd81540e24aa6a20492e7fe34a66d577b9983