Analysis
-
max time kernel
1s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:03
Behavioral task
behavioral1
Sample
5b5291947c95aff792f2db9203e15f6d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b5291947c95aff792f2db9203e15f6d.exe
Resource
win10v2004-20231222-en
General
-
Target
5b5291947c95aff792f2db9203e15f6d.exe
-
Size
302KB
-
MD5
5b5291947c95aff792f2db9203e15f6d
-
SHA1
6d63410862e94c3897e31b66efd09ef50d310693
-
SHA256
ac6cb6f537a475a754a66cc39ee1c30128a38e60f4df3ef5f01ba42bb7f40a5c
-
SHA512
7b44938ae05aaabfe1c165bcb45ea313e4cb82249d4ed958d01e4742533285cbc11a7f8aa0eebd7ef2f1ae2e611f541f21daa0b3a59914408c39caaed0ce6057
-
SSDEEP
3072:2u2i8dssoNyVIa0ARoXU01rPkhSIpwh1zIq9Zi1yZYp2JV/cTHN+rQC6AR:f2/smV5JSXUWz1FrBJY4cTHmQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3632 5b5291947c95aff792f2db9203e15f6d.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 5b5291947c95aff792f2db9203e15f6d.exe -
resource yara_rule behavioral2/memory/4192-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral2/memory/3632-14-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral2/files/0x000600000001e5df-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4192 5b5291947c95aff792f2db9203e15f6d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4192 5b5291947c95aff792f2db9203e15f6d.exe 3632 5b5291947c95aff792f2db9203e15f6d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3632 4192 5b5291947c95aff792f2db9203e15f6d.exe 21 PID 4192 wrote to memory of 3632 4192 5b5291947c95aff792f2db9203e15f6d.exe 21 PID 4192 wrote to memory of 3632 4192 5b5291947c95aff792f2db9203e15f6d.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5291947c95aff792f2db9203e15f6d.exe"C:\Users\Admin\AppData\Local\Temp\5b5291947c95aff792f2db9203e15f6d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\5b5291947c95aff792f2db9203e15f6d.exeC:\Users\Admin\AppData\Local\Temp\5b5291947c95aff792f2db9203e15f6d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5270b189d8f4229216d77bf777e1b2e71
SHA159edc05e85153ea8ef4b9e345b58529ab1e350ef
SHA2567dca55416fbfd23f27203756869845704113a80e5da58c9396357f76a37f6619
SHA512a84ddb4da9a0375f1d0261c055fef0c1c30d3c0f6dad79e8e3b6295f50e88e63a670bb3ef8fa395e473cdb1f3005acdfe8364661d5998dd770036f9b4536d7f4