Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
5fa8e9ea1ff436a76d59eeda467feee2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5fa8e9ea1ff436a76d59eeda467feee2.exe
Resource
win10v2004-20231222-en
General
-
Target
5fa8e9ea1ff436a76d59eeda467feee2.exe
-
Size
82KB
-
MD5
5fa8e9ea1ff436a76d59eeda467feee2
-
SHA1
2d4f486f16fe4e79ac66959abf884a4aa2c30784
-
SHA256
24f3abb7d12239d6a108fd6f8ce2f17b5417b115b1c609a1943328ab7f724e0c
-
SHA512
f2b1e88d34502843bc4c82b58cb13731f848b7df86b26d5012436e7b95b08070c29d34d0866ccd6750cd904d3669908aff6918356990344dd65fc8ae12b94a31
-
SSDEEP
1536:0KghyNDHMltcJ6RJxFmXRW9Jgiysu2mpZ/RRfAEj2uYS3hKMq+yq02EGLh0:0Nh67MTZJxYXsgiysuppZ34zfSxw+ysG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 5fa8e9ea1ff436a76d59eeda467feee2.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 5fa8e9ea1ff436a76d59eeda467feee2.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe 2840 5fa8e9ea1ff436a76d59eeda467feee2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2840 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe 29 PID 2204 wrote to memory of 2840 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe 29 PID 2204 wrote to memory of 2840 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe 29 PID 2204 wrote to memory of 2840 2204 5fa8e9ea1ff436a76d59eeda467feee2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa8e9ea1ff436a76d59eeda467feee2.exe"C:\Users\Admin\AppData\Local\Temp\5fa8e9ea1ff436a76d59eeda467feee2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\5fa8e9ea1ff436a76d59eeda467feee2.exeC:\Users\Admin\AppData\Local\Temp\5fa8e9ea1ff436a76d59eeda467feee2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD508bb9b2a4bf516a83f07b89b9604b208
SHA1ebc544dd79dffcd5cac08631b7a54d954e92ca55
SHA256dc42cf1f675f9960d3f69b8bd58823af6581af9911916eabf9c9e985dafa0032
SHA5124116f9ffcabbf551619a42c17058ffd53e7accc6f61e8f94848f840b8375b0b143e73095f55757a08e108056cfcd2faff59768f4f8d1b4c602d08eeb79ece52e