Analysis
-
max time kernel
240s -
max time network
285s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:04
Behavioral task
behavioral1
Sample
52b9560cb65f179541b219ef1e5301bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52b9560cb65f179541b219ef1e5301bc.exe
Resource
win10v2004-20231215-en
General
-
Target
52b9560cb65f179541b219ef1e5301bc.exe
-
Size
353KB
-
MD5
52b9560cb65f179541b219ef1e5301bc
-
SHA1
dfebd290451553b2d41136f8fdd8dccbda6940fa
-
SHA256
95d396301485fdc455b1065eb2da3058d213b53efd887afd227b41697453a0fd
-
SHA512
86f5b8d673da166530d10ff2354fe491db4f94f93b9542fabf1fb829aa5549b4e81933c07eb5dc844421f41788df77787327c19dc5051c29016938bda77cacb7
-
SSDEEP
6144:W/b97qOdNdwfSSXTIbNakgIGJM0pGY1WlgHMMCYdxfsLPrPwo+:W5qQdwfS+TIZPRGJM3yWWHGYTfmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2260 52b9560cb65f179541b219ef1e5301bc.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 52b9560cb65f179541b219ef1e5301bc.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 52b9560cb65f179541b219ef1e5301bc.exe -
resource yara_rule behavioral1/memory/2964-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x0004000000004ed7-10.dat upx behavioral1/memory/2964-12-0x0000000001500000-0x00000000015F1000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2964 52b9560cb65f179541b219ef1e5301bc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2964 52b9560cb65f179541b219ef1e5301bc.exe 2260 52b9560cb65f179541b219ef1e5301bc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2260 2964 52b9560cb65f179541b219ef1e5301bc.exe 29 PID 2964 wrote to memory of 2260 2964 52b9560cb65f179541b219ef1e5301bc.exe 29 PID 2964 wrote to memory of 2260 2964 52b9560cb65f179541b219ef1e5301bc.exe 29 PID 2964 wrote to memory of 2260 2964 52b9560cb65f179541b219ef1e5301bc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe"C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exeC:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2260
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD563ead90e2597d55b014327222bde9e8e
SHA154ebc7ff71ef3065fcf2c33ad8ed45ddb70660d7
SHA256c7f23f09b8e71df7684c98ebd52d3aaf55432419f4b4a1f3dd65e894353846e0
SHA5120b055812c93a86592fefca9b66610c299329e4b2c5d13fdc6e67e1de896d6117323881c42068f4617bc0d3dae52015d373ff1073f6d6d6633236946136a3543e