Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:51
Behavioral task
behavioral1
Sample
5806fd2fe5709c171a139c6023a34cf2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5806fd2fe5709c171a139c6023a34cf2.exe
Resource
win10v2004-20231215-en
General
-
Target
5806fd2fe5709c171a139c6023a34cf2.exe
-
Size
115KB
-
MD5
5806fd2fe5709c171a139c6023a34cf2
-
SHA1
407ce2b1383903106ea854eb1d1ec9eb01088a43
-
SHA256
72a883956367f5bef09ced0363fef767b36e431e8ac00cfe56c740f539aecd82
-
SHA512
0dd582a1a4520cfd0a2fec546c86d9d6585d263c1521728404e2fee8466b79b5c5408bbad3a07df81ccffa991f7662aab242a3dbd11396628faf3dd03d3792c3
-
SSDEEP
3072:4I5cF85OAMe5DREJfSicSEM+P+1CbNNylvjelDd05NZY6JQnxhe:4I5POAHSCSX2oCbnYa6Ne6Jmxhe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1240 5806fd2fe5709c171a139c6023a34cf2.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 5806fd2fe5709c171a139c6023a34cf2.exe -
Loads dropped DLL 1 IoCs
pid Process 2052 5806fd2fe5709c171a139c6023a34cf2.exe -
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/files/0x000c00000001224a-11.dat upx behavioral1/memory/1240-18-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2052 5806fd2fe5709c171a139c6023a34cf2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2052 5806fd2fe5709c171a139c6023a34cf2.exe 1240 5806fd2fe5709c171a139c6023a34cf2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1240 2052 5806fd2fe5709c171a139c6023a34cf2.exe 29 PID 2052 wrote to memory of 1240 2052 5806fd2fe5709c171a139c6023a34cf2.exe 29 PID 2052 wrote to memory of 1240 2052 5806fd2fe5709c171a139c6023a34cf2.exe 29 PID 2052 wrote to memory of 1240 2052 5806fd2fe5709c171a139c6023a34cf2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5806fd2fe5709c171a139c6023a34cf2.exe"C:\Users\Admin\AppData\Local\Temp\5806fd2fe5709c171a139c6023a34cf2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\5806fd2fe5709c171a139c6023a34cf2.exeC:\Users\Admin\AppData\Local\Temp\5806fd2fe5709c171a139c6023a34cf2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1240
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD55a3654095ac9e3aca63aa52318e0528e
SHA1321fd39a720a9dbcad0e3c68eb6fba57cc72f9e7
SHA256edb6d14b0c9ce445509762ab4f25bb3af29c66133f6c9e11bfec473b340d8c0d
SHA512044361c50eb06ab2eabe120f433df5dd047bcf49ddd23ff33554ed75d1c1168f8dd03e4be9197583a346c41b1bff143965ebb541a06940dc0a7ce89c79341d53