Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
09e2ca9315e61e5ae354493d63cd7ce1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09e2ca9315e61e5ae354493d63cd7ce1.exe
Resource
win10v2004-20231215-en
General
-
Target
09e2ca9315e61e5ae354493d63cd7ce1.exe
-
Size
82KB
-
MD5
09e2ca9315e61e5ae354493d63cd7ce1
-
SHA1
50ff26c5d059c2fe511648ac96627a04d48ce92e
-
SHA256
a496c7edd3a92e9950b8bb49f8324db046e41af404863bb6e496df88ab2fda6e
-
SHA512
107b3c4eb3b816ff29715b9c2c967f8273dd16063fb0c34dbd5ebc84b9e2adf486286be3a40c86e1dc18241de11d9a8b0067c3e5cddbc1d788b97a5e1af7205c
-
SSDEEP
1536:RNPF79yRUvMdAQshDY7FiW85n5KZLAh6fxJKnzuMG1bXX0OMEkh:vyRqU5iWqnIehWJDMG1bHQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2496 09e2ca9315e61e5ae354493d63cd7ce1.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 09e2ca9315e61e5ae354493d63cd7ce1.exe -
Loads dropped DLL 1 IoCs
pid Process 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe 2496 09e2ca9315e61e5ae354493d63cd7ce1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2496 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe 29 PID 2428 wrote to memory of 2496 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe 29 PID 2428 wrote to memory of 2496 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe 29 PID 2428 wrote to memory of 2496 2428 09e2ca9315e61e5ae354493d63cd7ce1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e2ca9315e61e5ae354493d63cd7ce1.exe"C:\Users\Admin\AppData\Local\Temp\09e2ca9315e61e5ae354493d63cd7ce1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\09e2ca9315e61e5ae354493d63cd7ce1.exeC:\Users\Admin\AppData\Local\Temp\09e2ca9315e61e5ae354493d63cd7ce1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5600f6419500728898516509a5c3fde24
SHA184ca69113c0a412a1e7b0dd087c67e29cd8e40f1
SHA25693cf83229b4a99b9c2e9c96b55619ef867820b1e60a5ab820c98a75abc1b6960
SHA512945b2ffb66fc7a7af56e39732761bbd81c72eb3934e2f38eceeea648191bc6c4a4be63601180670af171052591021a7581deef0ffd2bc8e5bd6aceea9609b2f1