Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
0de4dab01651ed75b1bd8fbbddd9f07d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0de4dab01651ed75b1bd8fbbddd9f07d.exe
Resource
win10v2004-20231215-en
General
-
Target
0de4dab01651ed75b1bd8fbbddd9f07d.exe
-
Size
82KB
-
MD5
0de4dab01651ed75b1bd8fbbddd9f07d
-
SHA1
52377f62b7509d0e683a35d6e5cd76c0993d0762
-
SHA256
6b58e10ae006c3ac36ecb841b76268ea08267235e6a5ec46f1512503946de1fb
-
SHA512
746e11466050e411ec119dc5e5be38b94a6c0450dd5057187849d5d806355b39daf59cf711b0e1e69b6d1df7009d8f4b5a7fad13a95779315193a86e2e577195
-
SSDEEP
1536:zaUE0JYyvgYnfMAUEC14UyG4nxCx7zqYOC6dOv420oCsn/3jH:eURJsg0AUEC14oWCxXqYzWw42DPLH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 0de4dab01651ed75b1bd8fbbddd9f07d.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 0de4dab01651ed75b1bd8fbbddd9f07d.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe 2712 0de4dab01651ed75b1bd8fbbddd9f07d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2712 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe 29 PID 2652 wrote to memory of 2712 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe 29 PID 2652 wrote to memory of 2712 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe 29 PID 2652 wrote to memory of 2712 2652 0de4dab01651ed75b1bd8fbbddd9f07d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0de4dab01651ed75b1bd8fbbddd9f07d.exe"C:\Users\Admin\AppData\Local\Temp\0de4dab01651ed75b1bd8fbbddd9f07d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\0de4dab01651ed75b1bd8fbbddd9f07d.exeC:\Users\Admin\AppData\Local\Temp\0de4dab01651ed75b1bd8fbbddd9f07d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5fa9afc2b2eaf9b50a66fea5654e97695
SHA111b39ec57673c7fb6d20862a61a0317315065f28
SHA25650ddc538203b51f674051ea4eb1c3a0134ca7b9ab5bef8ef9a985b419e37f4cb
SHA5124575400392c5b3dd56c5d3c07ebceda9a9d7cf1198d93e96ac64e8d066f15a5210ecefad3df970c1fe06db02d624e6f5c04692b8d66f5c7d1e00f12463eff06b