Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
7f7fe1c635e6213be006583bbd09b345.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f7fe1c635e6213be006583bbd09b345.exe
Resource
win10v2004-20231215-en
General
-
Target
7f7fe1c635e6213be006583bbd09b345.exe
-
Size
84KB
-
MD5
7f7fe1c635e6213be006583bbd09b345
-
SHA1
a187fd721bccb666ff4e21161d8d188430fc0ac0
-
SHA256
3dd1fb36c40f6cee54d1464c09b491c5f841399aaa73eb95732fa4ac4377df2e
-
SHA512
97040c4ccaa55f781b3d5e97db47d18126810b57daddca789ca273ff7d57a84f96a2f063effa12beaf68c0bde3493e844072896552f916a47f86ea0a1e7e86d2
-
SSDEEP
1536:Y9T8Ph/HMppdgfw5c40VmJMo3BePqtNAkrl8tANnN7pyKyBn:yeuzgY5zSYwPqtNAs8t8nN7pY5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 624 7f7fe1c635e6213be006583bbd09b345.exe -
Executes dropped EXE 1 IoCs
pid Process 624 7f7fe1c635e6213be006583bbd09b345.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4296 7f7fe1c635e6213be006583bbd09b345.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4296 7f7fe1c635e6213be006583bbd09b345.exe 624 7f7fe1c635e6213be006583bbd09b345.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 624 4296 7f7fe1c635e6213be006583bbd09b345.exe 92 PID 4296 wrote to memory of 624 4296 7f7fe1c635e6213be006583bbd09b345.exe 92 PID 4296 wrote to memory of 624 4296 7f7fe1c635e6213be006583bbd09b345.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f7fe1c635e6213be006583bbd09b345.exe"C:\Users\Admin\AppData\Local\Temp\7f7fe1c635e6213be006583bbd09b345.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\7f7fe1c635e6213be006583bbd09b345.exeC:\Users\Admin\AppData\Local\Temp\7f7fe1c635e6213be006583bbd09b345.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56bdc8b65923f862b6494e8c7104ab6fd
SHA17e8eaf6dcf93b485b431e2a93c34d60448a1bcc7
SHA2567c3198e49d81eab1524fca713b779889e4bac9e230c85de691fdbe2b9c536cb1
SHA512ed7602c36f10ae2fd4372556657a73c4225b3a5d71e990333fec0edfe0037520e26ba0e296153121a275cba26b1497cb0c9bc8ced7ee436ead73f54b10d42f9f