Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
494197af99fcdbebe112c5982c651251.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
494197af99fcdbebe112c5982c651251.exe
Resource
win10v2004-20231215-en
General
-
Target
494197af99fcdbebe112c5982c651251.exe
-
Size
927KB
-
MD5
494197af99fcdbebe112c5982c651251
-
SHA1
eb68a46c35ee955b68a02e889000ab5e5bcb8bbf
-
SHA256
5a441a1611f1edef3d600b2893ed43180159c33f465279d2b2bc8217adbc3070
-
SHA512
4b71b1527c39198cd894aa049707abc4c27ce1b3800f7c2c2520395aa2e296895b3911420bfbd52eb40318aea3a5b225b554ba3f1e3cb9859a8b625e19e1bc91
-
SSDEEP
6144:XDtbVPs8QmbXgMlzV40saiigCD4H2cHwXWNzDkYV:RJs8Qmr3VQ5zCD4TyWN9V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 494197af99fcdbebe112c5982c651251.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 494197af99fcdbebe112c5982c651251.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 494197af99fcdbebe112c5982c651251.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2960 494197af99fcdbebe112c5982c651251.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2680 494197af99fcdbebe112c5982c651251.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2680 2960 494197af99fcdbebe112c5982c651251.exe 29 PID 2960 wrote to memory of 2680 2960 494197af99fcdbebe112c5982c651251.exe 29 PID 2960 wrote to memory of 2680 2960 494197af99fcdbebe112c5982c651251.exe 29 PID 2960 wrote to memory of 2680 2960 494197af99fcdbebe112c5982c651251.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe"C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exeC:\Users\Admin\AppData\Local\Temp\494197af99fcdbebe112c5982c651251.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
927KB
MD570f230f41a3e734eb8fd017b062045ee
SHA176c5f75e71153aa722a8dbc356cab6f214128dd7
SHA25616daace1149b4ca07bba4c9fd0f17b0aa67d5b84d7c3ee58495220466596a1cd
SHA51228f240482328b24115a97a553fe23e645e0cb6dd56e142ecfd85067f337559df660a808cc4ff132ea0d744f27696c697ca650fc905e2cf980247b5f06f6c3f5f
-
Filesize
128KB
MD5c8bd8fb98a97d2f228a0e833613ec348
SHA11148a3036de9472debb9937b50a893137a02f55b
SHA2569d02ed185f9f51664e87ef97c3add69fe11283644e8dbfde36c92a6cdcb27935
SHA5122748ee82853f8b38774e832223e268e9da11efbf3ea91e7769fe6c599374f4a8594bbb5c032b8231a94d5a4d63e2497d03d367230f5703e92d45f5157030ff48