Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
037821b839c9483dacc5da892337f56a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
037821b839c9483dacc5da892337f56a.exe
Resource
win10v2004-20231215-en
General
-
Target
037821b839c9483dacc5da892337f56a.exe
-
Size
82KB
-
MD5
037821b839c9483dacc5da892337f56a
-
SHA1
2badc5f448828d0916e5406588dbcc842f42109d
-
SHA256
4301d83b83f651a9bbae7e535ad6993c2f7b10de06423d28113ea201a5d043e2
-
SHA512
6c3ba10228e404974b74e96cda88b72f7c7ca8e6916ae1e5f681a6b5a89b91f2ff44951a968f1e40e8a16326f621e84fb9a38458f7d3dde4f9e4146b3dc4867c
-
SSDEEP
1536:MhJz6Bldu2JvJlJOCGlugX8NwROUDXVqc+5qJrsyNv:gJzEseRlYlugX8NwROuXwWsyNv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 037821b839c9483dacc5da892337f56a.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 037821b839c9483dacc5da892337f56a.exe -
Loads dropped DLL 1 IoCs
pid Process 2988 037821b839c9483dacc5da892337f56a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2988 037821b839c9483dacc5da892337f56a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 037821b839c9483dacc5da892337f56a.exe 2316 037821b839c9483dacc5da892337f56a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2316 2988 037821b839c9483dacc5da892337f56a.exe 17 PID 2988 wrote to memory of 2316 2988 037821b839c9483dacc5da892337f56a.exe 17 PID 2988 wrote to memory of 2316 2988 037821b839c9483dacc5da892337f56a.exe 17 PID 2988 wrote to memory of 2316 2988 037821b839c9483dacc5da892337f56a.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\037821b839c9483dacc5da892337f56a.exe"C:\Users\Admin\AppData\Local\Temp\037821b839c9483dacc5da892337f56a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\037821b839c9483dacc5da892337f56a.exeC:\Users\Admin\AppData\Local\Temp\037821b839c9483dacc5da892337f56a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5089be9641db31faf41f076cf234c1bdd
SHA103b4159eb5c36de7ea83106403a0816f360e9afd
SHA256724b632bb5d06245b4b67e054b6bf96ea1a7651955dbdd1fcf1e5777ed87e102
SHA5126479dd7193738cfb7847925641bc0908472a46d2cb5842cdd0221826c0412f8a68df05deed0502e17ddd69c6294e9e8cb6545972470a45ab009d6d85f5251bd1