Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
6a67a3de2d92609840ebfe0ce6c60056.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a67a3de2d92609840ebfe0ce6c60056.exe
Resource
win10v2004-20231222-en
General
-
Target
6a67a3de2d92609840ebfe0ce6c60056.exe
-
Size
186KB
-
MD5
6a67a3de2d92609840ebfe0ce6c60056
-
SHA1
050cf73429baf916a6e6d1f54e59e0aad47c1db6
-
SHA256
f8bf7cc51302750af2bbad1e26dbcd5dc72861569fc5fd2f266d486b8cb05188
-
SHA512
ac1599c35499fdc7aeee325cb372fa7675dfe5e1575baab99cb50872be5b8cb50f0c3a8ac56f0cda2e5bc04389de9cf7ba6ecffdca5e36caff1f408798ea2259
-
SSDEEP
3072:UemgC3vaCO5dJlVbEDRyORp1Can7YA2gHVQbg+aGPNgJBpQmDd9hq4XLE:HmfabTWRyORpY07SgWgFONwBumDd9b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 6a67a3de2d92609840ebfe0ce6c60056.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 6a67a3de2d92609840ebfe0ce6c60056.exe -
Loads dropped DLL 1 IoCs
pid Process 1708 6a67a3de2d92609840ebfe0ce6c60056.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1708 6a67a3de2d92609840ebfe0ce6c60056.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2232 6a67a3de2d92609840ebfe0ce6c60056.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2232 1708 6a67a3de2d92609840ebfe0ce6c60056.exe 16 PID 1708 wrote to memory of 2232 1708 6a67a3de2d92609840ebfe0ce6c60056.exe 16 PID 1708 wrote to memory of 2232 1708 6a67a3de2d92609840ebfe0ce6c60056.exe 16 PID 1708 wrote to memory of 2232 1708 6a67a3de2d92609840ebfe0ce6c60056.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a67a3de2d92609840ebfe0ce6c60056.exe"C:\Users\Admin\AppData\Local\Temp\6a67a3de2d92609840ebfe0ce6c60056.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\6a67a3de2d92609840ebfe0ce6c60056.exeC:\Users\Admin\AppData\Local\Temp\6a67a3de2d92609840ebfe0ce6c60056.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5f5ecbaf5e5d3477f0da0df063197cdb0
SHA1cc3c79770cb9bf052bf6747099e6bb91e7660803
SHA256894eec84c4c73a6ae76a327071681455acc0e3312682fd20d460f760c4f4b050
SHA512be95281928802343193fd7f6bcdf861d6dd693443f59107a79bc9c1a839e31cc939c9cadefc83b54483492b76463c04971a3f3666cdc5900f49c4f3c643a68bd