Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:37
Behavioral task
behavioral1
Sample
05d40799ee20702ec37f64d818f64ffa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d40799ee20702ec37f64d818f64ffa.exe
Resource
win10v2004-20231222-en
General
-
Target
05d40799ee20702ec37f64d818f64ffa.exe
-
Size
1.3MB
-
MD5
05d40799ee20702ec37f64d818f64ffa
-
SHA1
91806e78aee452ad4592126ea61c7cca7e9b4e2e
-
SHA256
b2e742e7b8aefc3d8bb105afde938b3eee33d5e70469feabe1cbbee3982fd105
-
SHA512
ffc61e81c6ee65fe4f71a2d052125144acd8d6ce4ab47fcb3a6504a9729d1908e7078c414eae417b78f30170267e6c5a6f68d1ee359a7a6c802f2a64ac1af0b4
-
SSDEEP
24576:roIkiKBHGlY8Z0KqaTpTkdgR82ovhYkDgzhnMf5eLdcpMGQ+fvG:roiKxLEU6QhRwMxydck
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4196 05d40799ee20702ec37f64d818f64ffa.exe -
Executes dropped EXE 1 IoCs
pid Process 4196 05d40799ee20702ec37f64d818f64ffa.exe -
resource yara_rule behavioral2/memory/1012-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000600000001e5df-12.dat upx behavioral2/memory/4196-13-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1012 05d40799ee20702ec37f64d818f64ffa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1012 05d40799ee20702ec37f64d818f64ffa.exe 4196 05d40799ee20702ec37f64d818f64ffa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1012 wrote to memory of 4196 1012 05d40799ee20702ec37f64d818f64ffa.exe 29 PID 1012 wrote to memory of 4196 1012 05d40799ee20702ec37f64d818f64ffa.exe 29 PID 1012 wrote to memory of 4196 1012 05d40799ee20702ec37f64d818f64ffa.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d40799ee20702ec37f64d818f64ffa.exe"C:\Users\Admin\AppData\Local\Temp\05d40799ee20702ec37f64d818f64ffa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\05d40799ee20702ec37f64d818f64ffa.exeC:\Users\Admin\AppData\Local\Temp\05d40799ee20702ec37f64d818f64ffa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD54e61e016e669e100ea35c5b320044486
SHA1e65ed6f4508b3d49e52b6607051446d5a13d19bd
SHA25658a44e2b1b1ac91bd70b7ae96a8683fe5bd2094af2eacd3fb4a73c137f68b451
SHA512e39e4e91e859eca463868cddae44532fb2d0156baa27e64957eea26ce579d779db314b6c0ec3d2aa0be5c3313e7b54ecf78f9c9f6eb17fc9f12833f964b60def