Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 14:26
Static task
static1
Behavioral task
behavioral1
Sample
75819a1e9d98025a75490b26517044b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75819a1e9d98025a75490b26517044b5.exe
Resource
win10v2004-20231222-en
General
-
Target
75819a1e9d98025a75490b26517044b5.exe
-
Size
82KB
-
MD5
75819a1e9d98025a75490b26517044b5
-
SHA1
443e02bb1abe5d858e89d6aa8cc24fab35656093
-
SHA256
23d72d9ae232a6655d0195e745e5194bbfba61d9cc411b60002a2c6bae017604
-
SHA512
0961d924a1d162f307f3f167ddc2c2ce99c9c646b8ecb99909383e0cb73ed50d3474c5d2374d68574a0e2261b3d84064584417515c4211f5746b02fd81489d27
-
SSDEEP
1536:0VktyPBOhtaIF6+dyrjdLjNMGhKUEPnNDZzksobjGWfBUvH2Ac:0VktgBMF6+WjdLOEKUEF9zdoWWfBr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4424 75819a1e9d98025a75490b26517044b5.exe -
Executes dropped EXE 1 IoCs
pid Process 4424 75819a1e9d98025a75490b26517044b5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3856 75819a1e9d98025a75490b26517044b5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3856 75819a1e9d98025a75490b26517044b5.exe 4424 75819a1e9d98025a75490b26517044b5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4424 3856 75819a1e9d98025a75490b26517044b5.exe 27 PID 3856 wrote to memory of 4424 3856 75819a1e9d98025a75490b26517044b5.exe 27 PID 3856 wrote to memory of 4424 3856 75819a1e9d98025a75490b26517044b5.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe"C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exeC:\Users\Admin\AppData\Local\Temp\75819a1e9d98025a75490b26517044b5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD560a6a1fca3d9ec0a663a2e6dc3059dd3
SHA10b100379c0525ac65f600bc838d8a7e27e1cd670
SHA25625c4722b65a2481785e90f365f20de9df865cdf6ba69817fb7eb13cb4482a52a
SHA5127ff954971d66628dfcf2e4baa0e1a5b73510eade50b845d04f868d331914eb5ac1e46c4ce79b453600f2e1ccff20166fe3881238869bbba25280e727c5cd9e26