Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:27
Behavioral task
behavioral1
Sample
1ffc2c26ab31b537d7899a9f031db5b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ffc2c26ab31b537d7899a9f031db5b6.exe
Resource
win10v2004-20231215-en
General
-
Target
1ffc2c26ab31b537d7899a9f031db5b6.exe
-
Size
10.7MB
-
MD5
1ffc2c26ab31b537d7899a9f031db5b6
-
SHA1
72d6e7350529d54db43ecc7fdaab04faa4ad2fae
-
SHA256
edda1f75843df9a7fa61712ba133330248b20d0ed0d314ec11d2019750a73499
-
SHA512
8c4bf2628de439499f37010ae4e73623beb4f487e4096e5d90ce1cd3cd850dbcd6287de084f7b42a21d5d0df31d4adf669e8185671a3429ec091dc94372aba9e
-
SSDEEP
196608:XYcQl6YrAsgdsODCF6B/rAsgVt8Cr0rAsgdsODCF6B/rAsg:Ixs6AcOW6A/rreAcOW6A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3096 1ffc2c26ab31b537d7899a9f031db5b6.exe -
Executes dropped EXE 1 IoCs
pid Process 3096 1ffc2c26ab31b537d7899a9f031db5b6.exe -
resource yara_rule behavioral2/memory/2816-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x001100000002315e-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 1ffc2c26ab31b537d7899a9f031db5b6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2816 1ffc2c26ab31b537d7899a9f031db5b6.exe 3096 1ffc2c26ab31b537d7899a9f031db5b6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3096 2816 1ffc2c26ab31b537d7899a9f031db5b6.exe 22 PID 2816 wrote to memory of 3096 2816 1ffc2c26ab31b537d7899a9f031db5b6.exe 22 PID 2816 wrote to memory of 3096 2816 1ffc2c26ab31b537d7899a9f031db5b6.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffc2c26ab31b537d7899a9f031db5b6.exe"C:\Users\Admin\AppData\Local\Temp\1ffc2c26ab31b537d7899a9f031db5b6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\1ffc2c26ab31b537d7899a9f031db5b6.exeC:\Users\Admin\AppData\Local\Temp\1ffc2c26ab31b537d7899a9f031db5b6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58bada34ed52563ff0df2d8c6c4f907e1
SHA178b70c4a665e0efc08760318ec0bf81e3507c267
SHA256a7f4862ddb647e398da2dbced23c018927df04e480cb1cbde5b55f26eabf425f
SHA512653c64664107e04b9f6877f924911c828428eab12ab83354870c81b32a599bb2a3ab4e7a65bd73711f12655d3a81ee441aa405d767cb96c2f42d878be1cf71c3