Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 23:20
Behavioral task
behavioral1
Sample
06c030e3ea328d855071fdafa5f2523a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06c030e3ea328d855071fdafa5f2523a.exe
Resource
win10v2004-20231215-en
General
-
Target
06c030e3ea328d855071fdafa5f2523a.exe
-
Size
2.4MB
-
MD5
06c030e3ea328d855071fdafa5f2523a
-
SHA1
a55df7a05b8ce3849cc0b9718e42aedd4e57ea86
-
SHA256
caaa0c57f040273d482fc154b9a2a736a8f00300ed25471723fed6ecaf57d596
-
SHA512
828242af4ebb278bfc969bc6f89e7d6ad47f4b8c990279cc2647bbfd5019900b7940dc8a6524f75dfac500cd4993bcbd08e6fc0054a6cd3562ebb238a809ea2e
-
SSDEEP
49152:XnGqmfm+4zAL4p0lfoDTsNNYhLP4M338dB2IBlGuuDVUsdxxjr:XnGczAL4p0qTaNSgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4548 06c030e3ea328d855071fdafa5f2523a.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 06c030e3ea328d855071fdafa5f2523a.exe -
resource yara_rule behavioral2/memory/3504-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023216-11.dat upx behavioral2/memory/4548-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3504 06c030e3ea328d855071fdafa5f2523a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3504 06c030e3ea328d855071fdafa5f2523a.exe 4548 06c030e3ea328d855071fdafa5f2523a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 4548 3504 06c030e3ea328d855071fdafa5f2523a.exe 35 PID 3504 wrote to memory of 4548 3504 06c030e3ea328d855071fdafa5f2523a.exe 35 PID 3504 wrote to memory of 4548 3504 06c030e3ea328d855071fdafa5f2523a.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\06c030e3ea328d855071fdafa5f2523a.exe"C:\Users\Admin\AppData\Local\Temp\06c030e3ea328d855071fdafa5f2523a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\06c030e3ea328d855071fdafa5f2523a.exeC:\Users\Admin\AppData\Local\Temp\06c030e3ea328d855071fdafa5f2523a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c54da9ae0a169e59cd965869d9d34b7a
SHA1c55be1a3c36aebb56dba53c5562c72846e4b7d00
SHA256814462cf39d238bf39e83022ccf03c7588c8e37cfff6abd81841047bca24c0db
SHA5129a9155feebe73850938b5ae5437b009c762748cd37e6752d098e9eba278ce749859a06fda4de74d77d9a44b786a889a49b3febc6a089603355cddcb8ebb9be48