Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:01
Static task
static1
Behavioral task
behavioral1
Sample
36620da614ea74b11ebb99fb7894bd03.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36620da614ea74b11ebb99fb7894bd03.exe
Resource
win10v2004-20231215-en
General
-
Target
36620da614ea74b11ebb99fb7894bd03.exe
-
Size
84KB
-
MD5
36620da614ea74b11ebb99fb7894bd03
-
SHA1
cf50baa56a5f6eeffbce72395e516781e8504bcd
-
SHA256
f84afc2f7b934abd1493ca8ddf3ff8bd8eef5eec55c4571feeb9be90425e1525
-
SHA512
e747c6b4a7d31bda384f21e4f795986351eb0e4ef4188cf2c5ff9c8eea11ac766058049e8dcade889845ea1edec10cc765c50df75950bf0104a432dcc270c0d3
-
SSDEEP
1536:3akEptP8bee+SCzHMhBSBtpLDnLYDhc9RWWliQ7/rBtYRldoYdTwXFiGYhBW:KDmjSvLYDhcTTv/0TQ6BW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 980 36620da614ea74b11ebb99fb7894bd03.exe -
Executes dropped EXE 1 IoCs
pid Process 980 36620da614ea74b11ebb99fb7894bd03.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4296 36620da614ea74b11ebb99fb7894bd03.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4296 36620da614ea74b11ebb99fb7894bd03.exe 980 36620da614ea74b11ebb99fb7894bd03.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 980 4296 36620da614ea74b11ebb99fb7894bd03.exe 19 PID 4296 wrote to memory of 980 4296 36620da614ea74b11ebb99fb7894bd03.exe 19 PID 4296 wrote to memory of 980 4296 36620da614ea74b11ebb99fb7894bd03.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\36620da614ea74b11ebb99fb7894bd03.exe"C:\Users\Admin\AppData\Local\Temp\36620da614ea74b11ebb99fb7894bd03.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\36620da614ea74b11ebb99fb7894bd03.exeC:\Users\Admin\AppData\Local\Temp\36620da614ea74b11ebb99fb7894bd03.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a4d6f8c93d0131c7e51dcbdd5542fa8e
SHA1623135e5eef3576888d6f93c84b73e25382f561f
SHA2568fba447395226a37a49cd28cf587140ab69a81cd542161b697177214ceae789a
SHA512d5998bfbb1c99e1fdd1841a843f09ac6d09fa7ef4fa26d8f5edb7eaa92892ffa36cdb1d5480b5a51afa1f7840bc52c7d2f86845cd903df04163e6d5e8c4eb2a9