Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:13
Behavioral task
behavioral1
Sample
1e1bb50d1b247baf60f2243e42760efd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e1bb50d1b247baf60f2243e42760efd.exe
Resource
win10v2004-20231222-en
General
-
Target
1e1bb50d1b247baf60f2243e42760efd.exe
-
Size
1010KB
-
MD5
1e1bb50d1b247baf60f2243e42760efd
-
SHA1
dce135f07d0e3263f586778b0ed2608863ba423a
-
SHA256
533d962d2084f6306f40dca33c5a5a0a8408e61adc24b95fb13fccc161d178d7
-
SHA512
5d70940a91bcbaceb1f97f37a2ede74afed15b78728ed7d02ebb4e2f6c18b536d2d8e3fee21ceee61332dac3dac7f95cb890419958213e293bd11c9762c931f0
-
SSDEEP
12288:Vnjp8km4egkhfFYTfm6hiYc5plDFwrilMiYTfm:jvmfBmfduvlB7lbmf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2400 1e1bb50d1b247baf60f2243e42760efd.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 1e1bb50d1b247baf60f2243e42760efd.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 1e1bb50d1b247baf60f2243e42760efd.exe -
resource yara_rule behavioral1/memory/2496-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000b000000012243-10.dat upx behavioral1/memory/2400-17-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 1e1bb50d1b247baf60f2243e42760efd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 1e1bb50d1b247baf60f2243e42760efd.exe 2400 1e1bb50d1b247baf60f2243e42760efd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2400 2496 1e1bb50d1b247baf60f2243e42760efd.exe 29 PID 2496 wrote to memory of 2400 2496 1e1bb50d1b247baf60f2243e42760efd.exe 29 PID 2496 wrote to memory of 2400 2496 1e1bb50d1b247baf60f2243e42760efd.exe 29 PID 2496 wrote to memory of 2400 2496 1e1bb50d1b247baf60f2243e42760efd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1bb50d1b247baf60f2243e42760efd.exe"C:\Users\Admin\AppData\Local\Temp\1e1bb50d1b247baf60f2243e42760efd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\1e1bb50d1b247baf60f2243e42760efd.exeC:\Users\Admin\AppData\Local\Temp\1e1bb50d1b247baf60f2243e42760efd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1010KB
MD5512bf2b1498fc38f656d9513fbbec28f
SHA1833268c8e82a0d69a0e11dfda4124e554c6abc1f
SHA2564597d3e207c3fd95a5ba656d0d0f482f396e2d42e987a9f1928ce6ba5e7745f2
SHA51221fd050e146defcabac76eb0ecbbe7cd1514813177c3967ed1fe81fdb1424e1576e06d793a49ba9d55463d78643e95fed0fc7d8a3619764b6b444d46f6c2dc6a