Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
560240058dbd9995d15c86d41e34a98d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
560240058dbd9995d15c86d41e34a98d.exe
Resource
win10v2004-20231215-en
General
-
Target
560240058dbd9995d15c86d41e34a98d.exe
-
Size
82KB
-
MD5
560240058dbd9995d15c86d41e34a98d
-
SHA1
d820016a7ec5e289f3691413da71a3c0f3ab18c6
-
SHA256
d3a96cd34a9cc7f362cd5b92e0e36478ed9ffbf0f6b0e1cdd745f2bc111e9e23
-
SHA512
9878686ec748bb34fb467900c7237dfd21a63a784e970a784497a84a74f93fead0fc9fdbd983714c741d9cdf449ef6c273835bff9e5c4d3edb2603c4095c6309
-
SSDEEP
1536:LsbUmqM+W6e7oHKhv2igVJCnwAkyw/erwwQ1T8xB6ZiNoD:LsgmqMUecHhiBwnlerwwQ1TNZiNoD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 560240058dbd9995d15c86d41e34a98d.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 560240058dbd9995d15c86d41e34a98d.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 560240058dbd9995d15c86d41e34a98d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3032 560240058dbd9995d15c86d41e34a98d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3032 560240058dbd9995d15c86d41e34a98d.exe 2312 560240058dbd9995d15c86d41e34a98d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2312 3032 560240058dbd9995d15c86d41e34a98d.exe 29 PID 3032 wrote to memory of 2312 3032 560240058dbd9995d15c86d41e34a98d.exe 29 PID 3032 wrote to memory of 2312 3032 560240058dbd9995d15c86d41e34a98d.exe 29 PID 3032 wrote to memory of 2312 3032 560240058dbd9995d15c86d41e34a98d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\560240058dbd9995d15c86d41e34a98d.exe"C:\Users\Admin\AppData\Local\Temp\560240058dbd9995d15c86d41e34a98d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\560240058dbd9995d15c86d41e34a98d.exeC:\Users\Admin\AppData\Local\Temp\560240058dbd9995d15c86d41e34a98d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD551c346555c29df42e908c6c002a77a26
SHA1f1a0f0be0284db3032d9c2d451d3e63aaaac732c
SHA25673a65f6660650b61bdf2f4e17b457d9db316e9a054afd8e23d00cf03c7e8c60b
SHA5127c2040fd78015db90fd5a738fa7fbb319a13e5de03712ca83777bfb26c2714a5c2834df3320fc8b9ff0b24ad05599f12838581d085b8aab13b401277ff2617e3