Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
0927a20cfdd95461edf8ace6e2920975.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0927a20cfdd95461edf8ace6e2920975.exe
Resource
win10v2004-20231215-en
General
-
Target
0927a20cfdd95461edf8ace6e2920975.exe
-
Size
105KB
-
MD5
0927a20cfdd95461edf8ace6e2920975
-
SHA1
95dc3b72dcaeba882486c8480ee3bf9fcd6b184a
-
SHA256
92ac14c4fa442f3cbb46e4df7fc3d3d7cc080534c9256fdcd1c3977ad4c6ce6e
-
SHA512
ce7f006d962d9b4e85e4da6de8e6017e15fb181c40edfb7352cd949ff5840e3c91d079a6b150e4a17500e4f9440e8876c7da7ccda79a283c8470bb0ad36cfaeb
-
SSDEEP
1536:mct+aKxos5K/5ANSGqqQYzETJjlBaMdLJZqm++mt3s8MfiTt6DtW9YH:PtmvQhXjBXJ7VDqLVupW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 0927a20cfdd95461edf8ace6e2920975.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 0927a20cfdd95461edf8ace6e2920975.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 0927a20cfdd95461edf8ace6e2920975.exe 2176 0927a20cfdd95461edf8ace6e2920975.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2176 2148 0927a20cfdd95461edf8ace6e2920975.exe 29 PID 2148 wrote to memory of 2176 2148 0927a20cfdd95461edf8ace6e2920975.exe 29 PID 2148 wrote to memory of 2176 2148 0927a20cfdd95461edf8ace6e2920975.exe 29 PID 2148 wrote to memory of 2176 2148 0927a20cfdd95461edf8ace6e2920975.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe"C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exeC:\Users\Admin\AppData\Local\Temp\0927a20cfdd95461edf8ace6e2920975.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD538049b3765add26dc71381e6bc0d55f6
SHA1cd5835e70f072bb738dcee1a7ffc6d5db78f47b2
SHA2564e9040c3a439423129ef712e714bfbeb71a3fc436dfdc3c0e93f53d9198ccdd1
SHA512415b7f288f3d5cff5912c70e3170e5fdb1eba6494db60cdbaf5309a661c7de2e6f747302078903d9b2bd26249bb37ef5e642ae6b020e5188080564ddbb2fe6c0