Analysis
-
max time kernel
196s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
5de9e64c75a71b0bbef1e24098b62741.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5de9e64c75a71b0bbef1e24098b62741.exe
Resource
win10v2004-20231215-en
General
-
Target
5de9e64c75a71b0bbef1e24098b62741.exe
-
Size
82KB
-
MD5
5de9e64c75a71b0bbef1e24098b62741
-
SHA1
93103ea39a77ab7ea0260f2bbdee87076e0da560
-
SHA256
72c4ce6c9be4d9cce5e4d06fc944f7375fdd0435dd0af1506d5e1ae8ed19e135
-
SHA512
20daafb795efb79cbfb1daa74f50a53c9a2c37147bacf6f453d8575cbf1b4e0a1d28ffc407be14cd1d534d29b5716e50f86bf7f90d3a3a88f80bc519a44a3c34
-
SSDEEP
1536:0zndIEfBbjBNDdJZ8blP/65IGbQRE+7xkqLjKCzS1qtwcMUzX1WQ0K6:0zOYZdxdJZ8b5/658RxkqLj5zViTUzXY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4528 5de9e64c75a71b0bbef1e24098b62741.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 5de9e64c75a71b0bbef1e24098b62741.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5056 5de9e64c75a71b0bbef1e24098b62741.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5056 5de9e64c75a71b0bbef1e24098b62741.exe 4528 5de9e64c75a71b0bbef1e24098b62741.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4528 5056 5de9e64c75a71b0bbef1e24098b62741.exe 92 PID 5056 wrote to memory of 4528 5056 5de9e64c75a71b0bbef1e24098b62741.exe 92 PID 5056 wrote to memory of 4528 5056 5de9e64c75a71b0bbef1e24098b62741.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5de9e64c75a71b0bbef1e24098b62741.exe"C:\Users\Admin\AppData\Local\Temp\5de9e64c75a71b0bbef1e24098b62741.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\5de9e64c75a71b0bbef1e24098b62741.exeC:\Users\Admin\AppData\Local\Temp\5de9e64c75a71b0bbef1e24098b62741.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e37d5b6390e1e05a715c01986da23ab6
SHA10843ad3301dde701859f46e5b55a59b6b73ba224
SHA2564517dde275cbdbfd3476ee403607f461a2d2d31e6facb19fac7afe0966319839
SHA512a677b9f3d98ab316cd774cdfe8919e2a200479fa75edc79b39d36b30ff29f54ecae5beefb4a580c5b0be3501a8239edc995eabcb02a34d02d5d32aa5547ec02b