Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
746eaf39508666c5b793aec0ea5bb538.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
746eaf39508666c5b793aec0ea5bb538.exe
Resource
win10v2004-20231215-en
General
-
Target
746eaf39508666c5b793aec0ea5bb538.exe
-
Size
92KB
-
MD5
746eaf39508666c5b793aec0ea5bb538
-
SHA1
447ea98ca0d6b1984fbd6eb48e9af5c2855ccb6f
-
SHA256
ff2a9646826120e0408d5685e70c7f778638cd094c8e2c6227152b469d559744
-
SHA512
026129d0a38dafa3eca912e1fc767f1d39dc0507117db1888085d162a2810f134752d0ee4afb227ab3cfb0a8ffb1194331269c37be6ad9a3ee1df1c65fa32955
-
SSDEEP
1536:ysvbMCdCE8DFDR1Eaz7XVmDzgDwoWM37hsO19fwiQs1XqpYNpkT61u8sqezhqrHO:yDpDR1EclKEDwAjuQXqp8STx11KaLZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4832 746eaf39508666c5b793aec0ea5bb538.exe -
Executes dropped EXE 1 IoCs
pid Process 4832 746eaf39508666c5b793aec0ea5bb538.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4764 746eaf39508666c5b793aec0ea5bb538.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4764 746eaf39508666c5b793aec0ea5bb538.exe 4832 746eaf39508666c5b793aec0ea5bb538.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4832 4764 746eaf39508666c5b793aec0ea5bb538.exe 91 PID 4764 wrote to memory of 4832 4764 746eaf39508666c5b793aec0ea5bb538.exe 91 PID 4764 wrote to memory of 4832 4764 746eaf39508666c5b793aec0ea5bb538.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\746eaf39508666c5b793aec0ea5bb538.exe"C:\Users\Admin\AppData\Local\Temp\746eaf39508666c5b793aec0ea5bb538.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\746eaf39508666c5b793aec0ea5bb538.exeC:\Users\Admin\AppData\Local\Temp\746eaf39508666c5b793aec0ea5bb538.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51a324bbb1c7d199d3f83e11b7c6d2047
SHA10f68a2fd0c7b550252e11773d780cce47cd6f994
SHA2561a0c781381da38d1d1a6fe2dd737654278e0c12feb00153345da071c1bdf96a7
SHA512b0decaa82b702605e8488382450e215308265661dfee098b758c09e5304949a9a55b9d6fc470b732d9d972b0a1322f01964f6831734b2341b3512db058fd8af3