Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
566e5ea063574121dc7f6b4842b57ca3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
566e5ea063574121dc7f6b4842b57ca3.exe
Resource
win10v2004-20231215-en
General
-
Target
566e5ea063574121dc7f6b4842b57ca3.exe
-
Size
105KB
-
MD5
566e5ea063574121dc7f6b4842b57ca3
-
SHA1
55cf9f0174af726507c4c1698a60efc78299d6b5
-
SHA256
28ee80c1c424beeb9e9d81a4f1820bfe03ab0f6bbe9415390c90ab5aca457a24
-
SHA512
6ab908fe47f3fc7e6517dad1b80630fcb810a1d847473a61524a727a814b6fe2a1c60ea408cb31ea87b7a52e17826c6aac0e4a8f8e0066700e54feaf942e7c16
-
SSDEEP
1536:przqYY2aXhDPFP9jXzCljlN0eJFykSRDeipU88toxSxIyIrimUjiTt6DtW9YH:xzdGPBW5agrSRDPeo4qniDTpW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4700 566e5ea063574121dc7f6b4842b57ca3.exe -
Executes dropped EXE 1 IoCs
pid Process 4700 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4172 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4172 566e5ea063574121dc7f6b4842b57ca3.exe 4700 566e5ea063574121dc7f6b4842b57ca3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4700 4172 566e5ea063574121dc7f6b4842b57ca3.exe 90 PID 4172 wrote to memory of 4700 4172 566e5ea063574121dc7f6b4842b57ca3.exe 90 PID 4172 wrote to memory of 4700 4172 566e5ea063574121dc7f6b4842b57ca3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe"C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exeC:\Users\Admin\AppData\Local\Temp\566e5ea063574121dc7f6b4842b57ca3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5f865a78e5a3f06b7b6b57ce3e44d7d38
SHA1833723df650fe8105d86d129f05ffdc5b85fb454
SHA256bee60c27db8bee36ceb460854d00e8b6f8069513f2c1506d34f8e50012d81c2e
SHA5125a0310f3d3b6f5b1df8139c30d71eaf487cb1a2d623697d4957a3f6fd5025332b33e2ae709e206dc6c8caf6115744cbc106573fe0f73a287b2ec6fce22390029