Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:14
Behavioral task
behavioral1
Sample
082c721447b08961ddf3dc48594ff882.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
082c721447b08961ddf3dc48594ff882.exe
Resource
win10v2004-20231222-en
General
-
Target
082c721447b08961ddf3dc48594ff882.exe
-
Size
1.5MB
-
MD5
082c721447b08961ddf3dc48594ff882
-
SHA1
2af8ac535038ed2cdb5d307fe6e26bb83a305106
-
SHA256
03a9afdcf5809fd2307db69791cb54236a0af2dff776c93641a19414373c67b1
-
SHA512
c97926d9817f5f98d76c5555fb52c42e61a4e79c1db925394de1a5c3f48381344101dc06de364f8b910f56b327da308db37ae39258ed61d796f9a24011930bf4
-
SSDEEP
24576:v+Pge1CheRSkepClPaTSPKkgSSIGcAW8sGFwF4N2gdG4WndNfYQ3JV7MoH1lmSpk:m9kWSrClPYdSS6GFwF4N2gdGjndVYfmj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3652 082c721447b08961ddf3dc48594ff882.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 082c721447b08961ddf3dc48594ff882.exe -
resource yara_rule behavioral2/memory/3512-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000001e5df-11.dat upx behavioral2/memory/3652-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3512 082c721447b08961ddf3dc48594ff882.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3512 082c721447b08961ddf3dc48594ff882.exe 3652 082c721447b08961ddf3dc48594ff882.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3652 3512 082c721447b08961ddf3dc48594ff882.exe 89 PID 3512 wrote to memory of 3652 3512 082c721447b08961ddf3dc48594ff882.exe 89 PID 3512 wrote to memory of 3652 3512 082c721447b08961ddf3dc48594ff882.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\082c721447b08961ddf3dc48594ff882.exe"C:\Users\Admin\AppData\Local\Temp\082c721447b08961ddf3dc48594ff882.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\082c721447b08961ddf3dc48594ff882.exeC:\Users\Admin\AppData\Local\Temp\082c721447b08961ddf3dc48594ff882.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD52d3531654fb72aec4aaaed1a7c051b09
SHA1ce71aada3f054aabb38efb00d7bac0a0be2da0e7
SHA256f7649147b81158a32232d90f91421c9e708370b4aec8b3fbc5dfdad3ed58bd2f
SHA5127043a97b44dc41a960c997f7c64053d1cb2d8d101275783c2f1dfb005d0703fd0a0f22d30751273cdf87a0551926868a80bb6d2e5e1ded3271401ffea601a01c