Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 14:26

General

  • Target

    75819a1e9d98025a75490b26517044b5.exe

  • Size

    82KB

  • MD5

    75819a1e9d98025a75490b26517044b5

  • SHA1

    443e02bb1abe5d858e89d6aa8cc24fab35656093

  • SHA256

    23d72d9ae232a6655d0195e745e5194bbfba61d9cc411b60002a2c6bae017604

  • SHA512

    0961d924a1d162f307f3f167ddc2c2ce99c9c646b8ecb99909383e0cb73ed50d3474c5d2374d68574a0e2261b3d84064584417515c4211f5746b02fd81489d27

  • SSDEEP

    1536:0VktyPBOhtaIF6+dyrjdLjNMGhKUEPnNDZzksobjGWfBUvH2Ac:0VktgBMF6+WjdLOEKUEF9zdoWWfBr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe
    "C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe
      C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe

    Filesize

    82KB

    MD5

    60a6a1fca3d9ec0a663a2e6dc3059dd3

    SHA1

    0b100379c0525ac65f600bc838d8a7e27e1cd670

    SHA256

    25c4722b65a2481785e90f365f20de9df865cdf6ba69817fb7eb13cb4482a52a

    SHA512

    7ff954971d66628dfcf2e4baa0e1a5b73510eade50b845d04f868d331914eb5ac1e46c4ce79b453600f2e1ccff20166fe3881238869bbba25280e727c5cd9e26

  • memory/3856-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3856-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3856-1-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/3856-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4424-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4424-25-0x0000000004D90000-0x0000000004DAB000-memory.dmp

    Filesize

    108KB

  • memory/4424-14-0x0000000001500000-0x000000000152F000-memory.dmp

    Filesize

    188KB

  • memory/4424-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB