Analysis
-
max time kernel
124s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:14
Static task
static1
Behavioral task
behavioral1
Sample
1e20f02b6297861e1de8c58da0213d0c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e20f02b6297861e1de8c58da0213d0c.exe
Resource
win10v2004-20231222-en
General
-
Target
1e20f02b6297861e1de8c58da0213d0c.exe
-
Size
92KB
-
MD5
1e20f02b6297861e1de8c58da0213d0c
-
SHA1
b5d618207db165926bda425f944b848c8c0b7b5b
-
SHA256
20af546ab37f898174718208190e448a86a4e7c1ad7e8092acd66cb789561053
-
SHA512
9e300a763df6c8f39de3a6aba2e0b4cf3e5a439ef90432978d4fc080abfdffdec3f3a07c3d0d660ff63cf89f24b17a063c6e00e2eba4c859912757155cd6c0cb
-
SSDEEP
1536:EMYQ1ULg6lvBCIP8jOlKiOCt6EXpCZdOFDx2R7d2FEvQwm3/RLDHbVPmZdjsa:Vj1P61BH0lxG5CSFDxQsF35nbAZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4744 1e20f02b6297861e1de8c58da0213d0c.exe -
Executes dropped EXE 1 IoCs
pid Process 4744 1e20f02b6297861e1de8c58da0213d0c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4732 1e20f02b6297861e1de8c58da0213d0c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4732 1e20f02b6297861e1de8c58da0213d0c.exe 4744 1e20f02b6297861e1de8c58da0213d0c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4744 4732 1e20f02b6297861e1de8c58da0213d0c.exe 22 PID 4732 wrote to memory of 4744 4732 1e20f02b6297861e1de8c58da0213d0c.exe 22 PID 4732 wrote to memory of 4744 4732 1e20f02b6297861e1de8c58da0213d0c.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe"C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exeC:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51dd8c3af62265a3ad19090b9181288b0
SHA107fc74c7b82e23db05b62f9ecd8b6592dcb5308a
SHA256ad04791b58bdcbb10f0ebad9807aee3d585db0ca928b1bba50eac6a321996fe1
SHA5126f958707c139e0d5bc5e2481f076870955935216015545195db8d2add5ff8ef2a3b849bc214f6424fac3d302fe5180a578839f4ced23706eef6151948c3a21bc