Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:40
Behavioral task
behavioral1
Sample
0d41a4afd37fb1e186a56e4759f22a70.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d41a4afd37fb1e186a56e4759f22a70.exe
Resource
win10v2004-20231215-en
General
-
Target
0d41a4afd37fb1e186a56e4759f22a70.exe
-
Size
2.9MB
-
MD5
0d41a4afd37fb1e186a56e4759f22a70
-
SHA1
7b67a7a2172fcbb0ffa2c132eb42c52059f762a0
-
SHA256
305c1ddac5a14279601cba10bcff309a0c843b49fb2d6f66d0bea1c337e1fa25
-
SHA512
100633834d50e5a80db4351611b79eb459f6b45e59be03d5609600af5e043551ee4edaac55729918ae52f603a8cca1d782b8a40026f92b4216bbdf9930e4f712
-
SSDEEP
49152:lTDXzU2oOBVH46EgLCSeA2syFmSBuQa0nbxPIVUVNYYYCx3GKvgJLfFVEAR3+tE:dz7PfH46hjqJXBB/xPIVUkYbvgJhVd6l
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1968 0d41a4afd37fb1e186a56e4759f22a70.exe -
Executes dropped EXE 1 IoCs
pid Process 1968 0d41a4afd37fb1e186a56e4759f22a70.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 0d41a4afd37fb1e186a56e4759f22a70.exe -
resource yara_rule behavioral1/memory/2940-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b0000000122de-13.dat upx behavioral1/files/0x000b0000000122de-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2940 0d41a4afd37fb1e186a56e4759f22a70.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2940 0d41a4afd37fb1e186a56e4759f22a70.exe 1968 0d41a4afd37fb1e186a56e4759f22a70.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1968 2940 0d41a4afd37fb1e186a56e4759f22a70.exe 28 PID 2940 wrote to memory of 1968 2940 0d41a4afd37fb1e186a56e4759f22a70.exe 28 PID 2940 wrote to memory of 1968 2940 0d41a4afd37fb1e186a56e4759f22a70.exe 28 PID 2940 wrote to memory of 1968 2940 0d41a4afd37fb1e186a56e4759f22a70.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d41a4afd37fb1e186a56e4759f22a70.exe"C:\Users\Admin\AppData\Local\Temp\0d41a4afd37fb1e186a56e4759f22a70.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\0d41a4afd37fb1e186a56e4759f22a70.exeC:\Users\Admin\AppData\Local\Temp\0d41a4afd37fb1e186a56e4759f22a70.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD542e22c1ed169e3f8d27c5e06178f03ad
SHA1e713bc01fe4dd930e3357f75c42e6ac636c8b5c2
SHA256bb822de833c2f4609952d0c4dbf8126dad76f7a371e3c30bbc71e99406936701
SHA5129ed0985aa8be02e3f190b6e16c70d172a48649c06a51e1500b7080b629c57f312d770be29ded1b32d458b2b500109865fc0929f29bc97722864adc0a52ff8a24
-
Filesize
322KB
MD5c231d53c9b237dc4fda3ebc286d34d33
SHA1a517122f41f04f8d87e50ba8907d6443997a5597
SHA256870a0a266d1bb638075f6154a01fcc44659fe4851c9a962adfb7d7c615b25f00
SHA51283784872fb1dcb1e3c5b937c89fca67d464f0c52c4b221e0370f12938d03b6f614d94b95f1ac32322a522ee3551bdbdb312b373368207cfdc1e6e8bf6105e178