Analysis
-
max time kernel
240s -
max time network
283s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
566e5ea063574121dc7f6b4842b57ca3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
566e5ea063574121dc7f6b4842b57ca3.exe
Resource
win10v2004-20231215-en
General
-
Target
566e5ea063574121dc7f6b4842b57ca3.exe
-
Size
105KB
-
MD5
566e5ea063574121dc7f6b4842b57ca3
-
SHA1
55cf9f0174af726507c4c1698a60efc78299d6b5
-
SHA256
28ee80c1c424beeb9e9d81a4f1820bfe03ab0f6bbe9415390c90ab5aca457a24
-
SHA512
6ab908fe47f3fc7e6517dad1b80630fcb810a1d847473a61524a727a814b6fe2a1c60ea408cb31ea87b7a52e17826c6aac0e4a8f8e0066700e54feaf942e7c16
-
SSDEEP
1536:przqYY2aXhDPFP9jXzCljlN0eJFykSRDeipU88toxSxIyIrimUjiTt6DtW9YH:xzdGPBW5agrSRDPeo4qniDTpW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 566e5ea063574121dc7f6b4842b57ca3.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 566e5ea063574121dc7f6b4842b57ca3.exe -
Loads dropped DLL 1 IoCs
pid Process 2928 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2928 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2928 566e5ea063574121dc7f6b4842b57ca3.exe 2908 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2908 2928 566e5ea063574121dc7f6b4842b57ca3.exe 28 PID 2928 wrote to memory of 2908 2928 566e5ea063574121dc7f6b4842b57ca3.exe 28 PID 2928 wrote to memory of 2908 2928 566e5ea063574121dc7f6b4842b57ca3.exe 28 PID 2928 wrote to memory of 2908 2928 566e5ea063574121dc7f6b4842b57ca3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe"C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exeC:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5bd953220b7e0a52329bafd80c96e9b2c
SHA1ef94cf70e5e7b12d5a714f550433721d0cb602ca
SHA256d6a3f851dfb5f33ff32ede85a106dda563ebc0dd864e800c4e612c1cceb06013
SHA51202637b689c4b4348fdccceebf5020a79070fa513389528c8dc66e340df8db6718132274f48354899cad26ae87dead4496b8a9e97f65f8353cb22241c3b1ce5e7