Analysis
-
max time kernel
143s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
60f76c46ec6b99e5c2d3bb01c07b9306.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60f76c46ec6b99e5c2d3bb01c07b9306.exe
Resource
win10v2004-20231215-en
General
-
Target
60f76c46ec6b99e5c2d3bb01c07b9306.exe
-
Size
84KB
-
MD5
60f76c46ec6b99e5c2d3bb01c07b9306
-
SHA1
0ade5cb943be47117ede7210d276d4df1dc1f9cc
-
SHA256
3d79447a51006fdce5336bd0cf5724065000528d35181e7c9f5036a580aa5f34
-
SHA512
8cb81cfbfb578035cd8d4443a23a4f9d8d3688e6b9e8e9787b18d34a6be8d73d149c5d82f62261d06c54b304659a3ea9203f6fca8b8ac49394d6b7ec38167c3e
-
SSDEEP
1536:aJ79Lnwps83wdljx7sHbVQD8f94FQiQiwFIZHUGogI:al9Lw3U9xob4FQIewo1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1428 60f76c46ec6b99e5c2d3bb01c07b9306.exe -
Executes dropped EXE 1 IoCs
pid Process 1428 60f76c46ec6b99e5c2d3bb01c07b9306.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 404 60f76c46ec6b99e5c2d3bb01c07b9306.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 404 60f76c46ec6b99e5c2d3bb01c07b9306.exe 1428 60f76c46ec6b99e5c2d3bb01c07b9306.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 1428 404 60f76c46ec6b99e5c2d3bb01c07b9306.exe 26 PID 404 wrote to memory of 1428 404 60f76c46ec6b99e5c2d3bb01c07b9306.exe 26 PID 404 wrote to memory of 1428 404 60f76c46ec6b99e5c2d3bb01c07b9306.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f76c46ec6b99e5c2d3bb01c07b9306.exe"C:\Users\Admin\AppData\Local\Temp\60f76c46ec6b99e5c2d3bb01c07b9306.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\60f76c46ec6b99e5c2d3bb01c07b9306.exeC:\Users\Admin\AppData\Local\Temp\60f76c46ec6b99e5c2d3bb01c07b9306.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5353f88063d7d5f45bcafdfda32e7b3c4
SHA1591fa594fa834e475d8494ef92355c20375980d3
SHA25639540f1abe762725eab1964b7e967a28a2310206ec70af61d2f07b0267d8b2a8
SHA5124d75061e23a7242967b776f5e9d76ae84e8db862dcb2526a4d4f280ac5df65784b3870f2d803971e23311ac8a6b6af3f84802c922468cb6b2a952738e101503a