Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:35
Behavioral task
behavioral1
Sample
203299cdfe20d694df716520976ec0d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
203299cdfe20d694df716520976ec0d1.exe
Resource
win10v2004-20231215-en
General
-
Target
203299cdfe20d694df716520976ec0d1.exe
-
Size
1.3MB
-
MD5
203299cdfe20d694df716520976ec0d1
-
SHA1
1461f6b0131d48db6a116fa8c6ca7a21196eefec
-
SHA256
229eb402d6d9657f5e7ec4d8e2a5ece95a4da4779a2bfe988ca7fb63e665796b
-
SHA512
3d6a76afbc84ea507e951161e88e8a8a0da77685f7adb4c5fd14a5398544e92715684522c44249596b7bc1b01dedb41ccdd28244320a7f8fd711b02770da1acc
-
SSDEEP
24576:2GDg+QAidDux4YMVPzfsnLB0B02z4j9vpST97MEKT6pAg83OvG:XMFdDuDqYGBxc9vG2RC8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4888 203299cdfe20d694df716520976ec0d1.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 203299cdfe20d694df716520976ec0d1.exe -
resource yara_rule behavioral2/memory/1976-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001f45f-13.dat upx behavioral2/memory/4888-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1976 203299cdfe20d694df716520976ec0d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1976 203299cdfe20d694df716520976ec0d1.exe 4888 203299cdfe20d694df716520976ec0d1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 4888 1976 203299cdfe20d694df716520976ec0d1.exe 89 PID 1976 wrote to memory of 4888 1976 203299cdfe20d694df716520976ec0d1.exe 89 PID 1976 wrote to memory of 4888 1976 203299cdfe20d694df716520976ec0d1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\203299cdfe20d694df716520976ec0d1.exe"C:\Users\Admin\AppData\Local\Temp\203299cdfe20d694df716520976ec0d1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\203299cdfe20d694df716520976ec0d1.exeC:\Users\Admin\AppData\Local\Temp\203299cdfe20d694df716520976ec0d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5daa2fd357b585e5499839cc4dfd5111b
SHA1546fd5f4339cf4bebbe8f098da0a799bf547df49
SHA256207d91845d4e3091b4361a40acb7019639d04cc7c254d537c1b0da4cad047277
SHA5122cbc8be95aad3384f844d0722e237d73ab209245155081f13d25f0c25a494682d388bdf0d142155d020dd9070c60d26a12ad5a6a344bd3035f1f6907a02c3b0a