Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:20
Behavioral task
behavioral1
Sample
0e42dfcd5cb730784d4890726b0385f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e42dfcd5cb730784d4890726b0385f0.exe
Resource
win10v2004-20231215-en
General
-
Target
0e42dfcd5cb730784d4890726b0385f0.exe
-
Size
1.3MB
-
MD5
0e42dfcd5cb730784d4890726b0385f0
-
SHA1
8aabbc5cf7ae828c940c6801a67dba54c1148ef8
-
SHA256
2cda8c3ec0712239505f7956a12456f364f292904448a9b8183c9a2a20065edc
-
SHA512
4a54b9a17bc934faee0166ec65aa1b0360ff9fde81bf2a541bc3b35ee9dbecd120b60682d82e98771f0a264937b5ff50fe4334f13cbfa1228d45e28919cc2625
-
SSDEEP
24576:HagxN5epflmijZTfMyutTupJUG9UeapiGEP9NaQw0D3tMzvG:HamTepdmijZTENTuzUG+bVwNaQw0D9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 0e42dfcd5cb730784d4890726b0385f0.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 0e42dfcd5cb730784d4890726b0385f0.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 0e42dfcd5cb730784d4890726b0385f0.exe -
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x0008000000012281-11.dat upx behavioral1/files/0x0008000000012281-16.dat upx behavioral1/memory/2812-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 0e42dfcd5cb730784d4890726b0385f0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2192 0e42dfcd5cb730784d4890726b0385f0.exe 2812 0e42dfcd5cb730784d4890726b0385f0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2812 2192 0e42dfcd5cb730784d4890726b0385f0.exe 28 PID 2192 wrote to memory of 2812 2192 0e42dfcd5cb730784d4890726b0385f0.exe 28 PID 2192 wrote to memory of 2812 2192 0e42dfcd5cb730784d4890726b0385f0.exe 28 PID 2192 wrote to memory of 2812 2192 0e42dfcd5cb730784d4890726b0385f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e42dfcd5cb730784d4890726b0385f0.exe"C:\Users\Admin\AppData\Local\Temp\0e42dfcd5cb730784d4890726b0385f0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\0e42dfcd5cb730784d4890726b0385f0.exeC:\Users\Admin\AppData\Local\Temp\0e42dfcd5cb730784d4890726b0385f0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD52cf5fb0885299670b18096bdd8dfb1ab
SHA1d2db6fcfddf2616b7421c71c7e1d0c52d2ed0f9b
SHA256eb63257ad477dc6c5a2c4deb16dd2898d8c39b5f74699281d022b1e20810787a
SHA512cd33887d15f09759414022db86a76f80ede736d27cff85f8de86279a2ff0771b20ea8f64065e8dbd935f5f4e076c354cfa851e42a944fcfa4d128399c83e0859
-
Filesize
376KB
MD548b25f397fbe55c1039498612caada07
SHA1f434210f8ef3dcaa8429ab8c42e7af9f2e4daf4c
SHA256bc7f25650635ec57ae1da5c7be75706d66f4a5b9c1d82bf82d1ec8828f7b22d7
SHA5127312aff00918b08d61e3535354c04d67a0ad7dba8b4dd296272050e54bd20072c94bf9b3fe38dfa5a077f23652cf051db8d93f681e32a1c6a2d178afffa3fb44