Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
1d619c9fd03fd214ec21e90a113bdc52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d619c9fd03fd214ec21e90a113bdc52.exe
Resource
win10v2004-20231215-en
General
-
Target
1d619c9fd03fd214ec21e90a113bdc52.exe
-
Size
82KB
-
MD5
1d619c9fd03fd214ec21e90a113bdc52
-
SHA1
f30564ba6c4ebf13fc274a5c62d47eb4100a57bd
-
SHA256
3985185522da6dfd62dab8a264ac2f77683cfa8597afcc10b76e6d0311482cfc
-
SHA512
e2498c22aaf0a46f03a6992d35cfdb20311835703ebda7be3dd8b2216580dbaf334113fc7ec8bb2cc2b8a57b569bd2066beb78048f3819c1ef0145058ffa6873
-
SSDEEP
1536:tq9rm1l5+ifuoJsb4OIqgtqYV64AUHdJlznQXEEyxKEfNZqnTcv0ZsX//wK:urm1/7ud0nh64dLdnkByMnSOUD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1888 1d619c9fd03fd214ec21e90a113bdc52.exe -
Executes dropped EXE 1 IoCs
pid Process 1888 1d619c9fd03fd214ec21e90a113bdc52.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 1d619c9fd03fd214ec21e90a113bdc52.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 1d619c9fd03fd214ec21e90a113bdc52.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 1d619c9fd03fd214ec21e90a113bdc52.exe 1888 1d619c9fd03fd214ec21e90a113bdc52.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1888 2220 1d619c9fd03fd214ec21e90a113bdc52.exe 29 PID 2220 wrote to memory of 1888 2220 1d619c9fd03fd214ec21e90a113bdc52.exe 29 PID 2220 wrote to memory of 1888 2220 1d619c9fd03fd214ec21e90a113bdc52.exe 29 PID 2220 wrote to memory of 1888 2220 1d619c9fd03fd214ec21e90a113bdc52.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe"C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exeC:\Users\Admin\AppData\Local\Temp\1d619c9fd03fd214ec21e90a113bdc52.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD522ebdebe2239910dfa48d597a51c61f3
SHA1d7669f533c011f399e4d16dba18908e76a9b888b
SHA256faa2625484f1500f9defd1767610988da99a90a59724093bf653e219097ee895
SHA51255ad23c580e8f1b79c2eb3a3e8e45a4683e5c9097da98989b201e70c2b64b8382837e23ea48cbe69e565d2fb18b462c4ddf6ccd4e7a1aa056eb554a241c860bd