Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:59
Behavioral task
behavioral1
Sample
39ce733ac9323ed252f23381149987c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39ce733ac9323ed252f23381149987c6.exe
Resource
win10v2004-20231222-en
General
-
Target
39ce733ac9323ed252f23381149987c6.exe
-
Size
59KB
-
MD5
39ce733ac9323ed252f23381149987c6
-
SHA1
03cc3fe74518d7249a5f4c339c6270b2cba61767
-
SHA256
6e595ccc650649301502e56b8ee991b3f0a4c5f0b13b8e0e2bf847f8135d0100
-
SHA512
a1a75d37590d4e351541a08772263f620b72343dfe5d3364bcaae4c1c71fcec331de960c59d94b4153ae27c70e9b8aecbb2947362fa4b36ba826f42548f784ad
-
SSDEEP
1536:CNNlTkAesDxRTPScN03jgRlF1Uok3KH37WLKHDqJtE4N6H9:QlwnexJP3NRL2ok3Q7YJK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2064 39ce733ac9323ed252f23381149987c6.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 39ce733ac9323ed252f23381149987c6.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 39ce733ac9323ed252f23381149987c6.exe -
resource yara_rule behavioral1/memory/2496-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x0009000000012258-14.dat upx behavioral1/memory/2064-16-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 39ce733ac9323ed252f23381149987c6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 39ce733ac9323ed252f23381149987c6.exe 2064 39ce733ac9323ed252f23381149987c6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2064 2496 39ce733ac9323ed252f23381149987c6.exe 15 PID 2496 wrote to memory of 2064 2496 39ce733ac9323ed252f23381149987c6.exe 15 PID 2496 wrote to memory of 2064 2496 39ce733ac9323ed252f23381149987c6.exe 15 PID 2496 wrote to memory of 2064 2496 39ce733ac9323ed252f23381149987c6.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ce733ac9323ed252f23381149987c6.exeC:\Users\Admin\AppData\Local\Temp\39ce733ac9323ed252f23381149987c6.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2064
-
C:\Users\Admin\AppData\Local\Temp\39ce733ac9323ed252f23381149987c6.exe"C:\Users\Admin\AppData\Local\Temp\39ce733ac9323ed252f23381149987c6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5ae98428b62310d73bd65a4d392cb1cf4
SHA13042befe631a57cfe8be54f869a019b08c33656d
SHA256628ac06fc855fd7e7c2a1718fa1f88245b723db97bf3622a89920943e86371de
SHA51231293e56f44ff34f2de0c002cd8c80393f19ce93d81d56deabcd81ba7e50881b8e0ce991711e5821a26d190a1b8feb16cd70eec37ae4ea1175ad1b3327a6feb0