Analysis
-
max time kernel
192s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:57
Behavioral task
behavioral1
Sample
026c8b3ca9f6fa84f7c38dca706c2366.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
026c8b3ca9f6fa84f7c38dca706c2366.exe
Resource
win10v2004-20231215-en
General
-
Target
026c8b3ca9f6fa84f7c38dca706c2366.exe
-
Size
1.3MB
-
MD5
026c8b3ca9f6fa84f7c38dca706c2366
-
SHA1
e975304605c31d1a7003f5cc46d3cb88786c7da5
-
SHA256
5f2da5e7e86cb023afbfdabf84ca7eac61c90debb6ec22f527dbf4d30dfe7042
-
SHA512
caa5fa71776592f77a7b2cfdc298eec5b621cc0cbfa620b20e180de79b6e8dc81ea33a96d5d5bd84e25dc8e4add97d5e0d3561435f4f2b1955c1a8fca0054029
-
SSDEEP
24576:pxcW7lQEcqu2pv+hja0yEOrOcc2/FUd3JIsagKxeLI+ajGz6QpBSKjbZtTBLvG:pFcqu2pv+hTCOd2/FUd5ItgMeLI+Qeu4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4092 026c8b3ca9f6fa84f7c38dca706c2366.exe -
Executes dropped EXE 1 IoCs
pid Process 4092 026c8b3ca9f6fa84f7c38dca706c2366.exe -
resource yara_rule behavioral2/memory/4864-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000e00000001e6f2-13.dat upx behavioral2/memory/4092-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 026c8b3ca9f6fa84f7c38dca706c2366.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4864 026c8b3ca9f6fa84f7c38dca706c2366.exe 4092 026c8b3ca9f6fa84f7c38dca706c2366.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4092 4864 026c8b3ca9f6fa84f7c38dca706c2366.exe 90 PID 4864 wrote to memory of 4092 4864 026c8b3ca9f6fa84f7c38dca706c2366.exe 90 PID 4864 wrote to memory of 4092 4864 026c8b3ca9f6fa84f7c38dca706c2366.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\026c8b3ca9f6fa84f7c38dca706c2366.exe"C:\Users\Admin\AppData\Local\Temp\026c8b3ca9f6fa84f7c38dca706c2366.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\026c8b3ca9f6fa84f7c38dca706c2366.exeC:\Users\Admin\AppData\Local\Temp\026c8b3ca9f6fa84f7c38dca706c2366.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59d3bbe2093c56dea7935d66a38d430fc
SHA1e36169e5423dc3f0355da686939bf12478e2e3a0
SHA256473e26cef09fb5a24f73033b3a71e96e2a5b544f1f025294928b23f6bd8ec34c
SHA5128ab9a8e250036dcc103b526dd2778f51b2ecf73167e37dbb2f050110770ef439679791955bfc29809ac03cc381d3ee7fbe8e73124b5b877bf359d4647fed6ff7