Analysis

  • max time kernel
    124s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 22:14

General

  • Target

    1e20f02b6297861e1de8c58da0213d0c.exe

  • Size

    92KB

  • MD5

    1e20f02b6297861e1de8c58da0213d0c

  • SHA1

    b5d618207db165926bda425f944b848c8c0b7b5b

  • SHA256

    20af546ab37f898174718208190e448a86a4e7c1ad7e8092acd66cb789561053

  • SHA512

    9e300a763df6c8f39de3a6aba2e0b4cf3e5a439ef90432978d4fc080abfdffdec3f3a07c3d0d660ff63cf89f24b17a063c6e00e2eba4c859912757155cd6c0cb

  • SSDEEP

    1536:EMYQ1ULg6lvBCIP8jOlKiOCt6EXpCZdOFDx2R7d2FEvQwm3/RLDHbVPmZdjsa:Vj1P61BH0lxG5CSFDxQsF35nbAZRx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe
    "C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe
      C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1e20f02b6297861e1de8c58da0213d0c.exe

    Filesize

    92KB

    MD5

    1dd8c3af62265a3ad19090b9181288b0

    SHA1

    07fc74c7b82e23db05b62f9ecd8b6592dcb5308a

    SHA256

    ad04791b58bdcbb10f0ebad9807aee3d585db0ca928b1bba50eac6a321996fe1

    SHA512

    6f958707c139e0d5bc5e2481f076870955935216015545195db8d2add5ff8ef2a3b849bc214f6424fac3d302fe5180a578839f4ced23706eef6151948c3a21bc

  • memory/4732-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4732-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4732-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4732-1-0x0000000001430000-0x000000000145F000-memory.dmp

    Filesize

    188KB

  • memory/4744-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4744-14-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/4744-24-0x00000000015E0000-0x00000000015FB000-memory.dmp

    Filesize

    108KB

  • memory/4744-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB