Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:57
Behavioral task
behavioral1
Sample
02694e15e04890445430bc1647f0e1f3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02694e15e04890445430bc1647f0e1f3.exe
Resource
win10v2004-20231215-en
General
-
Target
02694e15e04890445430bc1647f0e1f3.exe
-
Size
11.7MB
-
MD5
02694e15e04890445430bc1647f0e1f3
-
SHA1
998ea6f28ffd39c1b2b2cba346746be7c7a1a12e
-
SHA256
d54a7650f83b4eed710c994dc0678a6d4adc47dda5a5856de0f0be53a65970b8
-
SHA512
b3962c0c565ceba61e6ad79d2d1b54a875c0e6c47e2bb1ac71b7c8c0c345b3d5b1de0939f96b9833711a4edd6e4bd09f7c6ff3a9243569af59e4af398070341f
-
SSDEEP
196608:PZIMgl/iBiPy9Cuy5qgl/iBiP455Ggl/iBiPy9Cuy5qgl/iBiP:PZIM2il9Cu92iZ82il9Cu92i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 02694e15e04890445430bc1647f0e1f3.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 02694e15e04890445430bc1647f0e1f3.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 02694e15e04890445430bc1647f0e1f3.exe -
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c00000001220d-13.dat upx behavioral1/files/0x000c00000001220d-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2240 02694e15e04890445430bc1647f0e1f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2240 02694e15e04890445430bc1647f0e1f3.exe 2196 02694e15e04890445430bc1647f0e1f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2196 2240 02694e15e04890445430bc1647f0e1f3.exe 22 PID 2240 wrote to memory of 2196 2240 02694e15e04890445430bc1647f0e1f3.exe 22 PID 2240 wrote to memory of 2196 2240 02694e15e04890445430bc1647f0e1f3.exe 22 PID 2240 wrote to memory of 2196 2240 02694e15e04890445430bc1647f0e1f3.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\02694e15e04890445430bc1647f0e1f3.exe"C:\Users\Admin\AppData\Local\Temp\02694e15e04890445430bc1647f0e1f3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\02694e15e04890445430bc1647f0e1f3.exeC:\Users\Admin\AppData\Local\Temp\02694e15e04890445430bc1647f0e1f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5164b64bcc29a079d028fc095abdcd61d
SHA1ecea82f3a3af70562c5eff46401a8fdf55860ad1
SHA25669ac2362f8e4c10081d744e1dbb0a51a56b798936b3864909ecaaeab0a28e632
SHA512c8ae767c57a88958ab74f778fb9a9e2b47aae45bfe0949aa0844f6ad61a80520f3fbb0691e234835dd1e465b964c2772a6c24126663c48d8a2d1ba75530e8f3c