Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
06670045a979c1b2148bbc091ee0b26e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06670045a979c1b2148bbc091ee0b26e.exe
Resource
win10v2004-20231215-en
General
-
Target
06670045a979c1b2148bbc091ee0b26e.exe
-
Size
165KB
-
MD5
06670045a979c1b2148bbc091ee0b26e
-
SHA1
1a396c6145a598727deaa7dd2820233636719724
-
SHA256
7f0b67b6ca6356f98c0c86dca61f66a5e5d1bea830f8e0fb7f347539fffda27d
-
SHA512
a654491df6b8e0a91420041c78f1e4c9f5d242db1f8755c8171863b623177da192e690e6e7ff0a7a205e8a69c3ad0e49a8ecc4f4d958fc41a794e1cadf661949
-
SSDEEP
3072:GGPLMdKCUPN6UkpOv5u2rq6wuXfhHDn+lRJSI5l9Mg/RuZrsnagYnTdEV:DzOKCsNkpi5uMX5HDneTSI5la+9sny
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 06670045a979c1b2148bbc091ee0b26e.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 06670045a979c1b2148bbc091ee0b26e.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 06670045a979c1b2148bbc091ee0b26e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 06670045a979c1b2148bbc091ee0b26e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 06670045a979c1b2148bbc091ee0b26e.exe 2292 06670045a979c1b2148bbc091ee0b26e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2292 2980 06670045a979c1b2148bbc091ee0b26e.exe 29 PID 2980 wrote to memory of 2292 2980 06670045a979c1b2148bbc091ee0b26e.exe 29 PID 2980 wrote to memory of 2292 2980 06670045a979c1b2148bbc091ee0b26e.exe 29 PID 2980 wrote to memory of 2292 2980 06670045a979c1b2148bbc091ee0b26e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\06670045a979c1b2148bbc091ee0b26e.exe"C:\Users\Admin\AppData\Local\Temp\06670045a979c1b2148bbc091ee0b26e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\06670045a979c1b2148bbc091ee0b26e.exeC:\Users\Admin\AppData\Local\Temp\06670045a979c1b2148bbc091ee0b26e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD52753676f966cc88d31a7f5f655bfdf4d
SHA11692318b372b6f8f5df464a719c50c490c9c5efc
SHA256d183c09f7b0af5cd15e3410e526c2fcfa045a615595ab0d3f3aba692bbb55540
SHA5122879c8500a39ac8db435dcbf4e862ab9bcc4e7d41c534c22cdad23f794a7924533980eac865c4c3af59b621c8eae76eb75b72c4eeaae57088d758245b8c849b7