Analysis
-
max time kernel
144s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
11deddceb76e6c880a2638d16089a339.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11deddceb76e6c880a2638d16089a339.exe
Resource
win10v2004-20231215-en
General
-
Target
11deddceb76e6c880a2638d16089a339.exe
-
Size
84KB
-
MD5
11deddceb76e6c880a2638d16089a339
-
SHA1
816884bb49a58b9b5b6a9449c315f3ca0812a471
-
SHA256
73b13731677e004a2b73f29dab5c2a1a3163b6e06239333d93d65f969c60fa3d
-
SHA512
7290943ae9a830cc8541a4f8692eb62f1e0bbddd170b1d228eecffed786a21f04a6c6a3266ed27559b8e5eb9a73ecc9870f28d105241034567a4e5cd90947f9f
-
SSDEEP
1536:1SQgSbIXjqS5klkyh8PL0IrMDXNp636POWzT3vlwtwXJjKpVznVT:1BbqjM3h8RrMDT003v26gbJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3444 11deddceb76e6c880a2638d16089a339.exe -
Executes dropped EXE 1 IoCs
pid Process 3444 11deddceb76e6c880a2638d16089a339.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 11deddceb76e6c880a2638d16089a339.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1616 11deddceb76e6c880a2638d16089a339.exe 3444 11deddceb76e6c880a2638d16089a339.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3444 1616 11deddceb76e6c880a2638d16089a339.exe 93 PID 1616 wrote to memory of 3444 1616 11deddceb76e6c880a2638d16089a339.exe 93 PID 1616 wrote to memory of 3444 1616 11deddceb76e6c880a2638d16089a339.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\11deddceb76e6c880a2638d16089a339.exe"C:\Users\Admin\AppData\Local\Temp\11deddceb76e6c880a2638d16089a339.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\11deddceb76e6c880a2638d16089a339.exeC:\Users\Admin\AppData\Local\Temp\11deddceb76e6c880a2638d16089a339.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5de02a6a1edea91a5e833298887707e10
SHA177457f9f06d839056daeb3fbe2455b7b21cee847
SHA256fdc09798172d5fb8330be7c56f08d34fc7f5df2a1044da04901de471a27edbd6
SHA51240f51cfece27d1b8435db38bb43fc9d4b5fcefe6e6936d58c0eb8704e5c36deb8224ac4e6b42bc2bc6b3b359e29185a7057a1dee436d478b666adf2076af9b29