Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 13:04
Behavioral task
behavioral1
Sample
70b9c5d137ca9437858e8c2f007e66d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70b9c5d137ca9437858e8c2f007e66d6.exe
Resource
win10v2004-20231215-en
General
-
Target
70b9c5d137ca9437858e8c2f007e66d6.exe
-
Size
59KB
-
MD5
70b9c5d137ca9437858e8c2f007e66d6
-
SHA1
23a9961be1177ca4730626e280078d6205c3d1c1
-
SHA256
07e2531fee5f12d9e580b081f3b2d19911435045e7329e1283cfb77101c456c6
-
SHA512
612a9a5212f7c396d69cb46190d445a412e9b82c475c2663269c4336f8a96622199b4d7a51b90c3651ba159e1eaeb7c068346cede5e65b0194afe679dea4dddd
-
SSDEEP
1536:F0M5uxmhkMkvuDvyegDBsNoMN4NUyBUrxHaRm/RhlS:FCmhkR2DKeCaoG49KrxHJpho
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4940 70b9c5d137ca9437858e8c2f007e66d6.exe -
Executes dropped EXE 1 IoCs
pid Process 4940 70b9c5d137ca9437858e8c2f007e66d6.exe -
resource yara_rule behavioral2/memory/2524-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x00070000000231e0-11.dat upx behavioral2/memory/4940-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2524 70b9c5d137ca9437858e8c2f007e66d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2524 70b9c5d137ca9437858e8c2f007e66d6.exe 4940 70b9c5d137ca9437858e8c2f007e66d6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4940 2524 70b9c5d137ca9437858e8c2f007e66d6.exe 20 PID 2524 wrote to memory of 4940 2524 70b9c5d137ca9437858e8c2f007e66d6.exe 20 PID 2524 wrote to memory of 4940 2524 70b9c5d137ca9437858e8c2f007e66d6.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\70b9c5d137ca9437858e8c2f007e66d6.exe"C:\Users\Admin\AppData\Local\Temp\70b9c5d137ca9437858e8c2f007e66d6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\70b9c5d137ca9437858e8c2f007e66d6.exeC:\Users\Admin\AppData\Local\Temp\70b9c5d137ca9437858e8c2f007e66d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52d9051d37a9428ab8d0f52bae60661e6
SHA11dee176ff7baa232f6dfae633010b367315992d9
SHA2563aeb16048bd2acc6ef73b4d7284ad6fd8ff12d0eb86bf7f2c5cf07c6b91c73e2
SHA512794c1708aeb78f1eac4fe1f74b12695f9a984ca0818f8e251cab24dbc186a2c674891b4c41574b1b0ba82529b8f04503a74a9460c669c6cb56a58aa77c3d7e00