Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:54
Behavioral task
behavioral1
Sample
1185ee73771569f4e29c468b69bbc52d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1185ee73771569f4e29c468b69bbc52d.exe
Resource
win10v2004-20231215-en
General
-
Target
1185ee73771569f4e29c468b69bbc52d.exe
-
Size
10.7MB
-
MD5
1185ee73771569f4e29c468b69bbc52d
-
SHA1
a24cb82f3689fdb0c865629b05b5d80464571d15
-
SHA256
300ce9f88c3f3e421bd22634ebef74a9c3892b37e944f523efae94c9fa5c5640
-
SHA512
2b3b0fad498cde684b62620f27d161e97f47a4c96a0612ce2e29a0733f8772628c0facd6c1fceb3b12204846552e3ba6b8870ffe195340ab6b2e61581200543d
-
SSDEEP
196608:PqF792YAJTBVsGZRu2YAJeGfSY2YAJTBVsGZRu2YAJ:PAKvBuKzfLKvBuK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1800 1185ee73771569f4e29c468b69bbc52d.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 1185ee73771569f4e29c468b69bbc52d.exe -
resource yara_rule behavioral2/memory/1524-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023223-13.dat upx behavioral2/memory/1800-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1524 1185ee73771569f4e29c468b69bbc52d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1524 1185ee73771569f4e29c468b69bbc52d.exe 1800 1185ee73771569f4e29c468b69bbc52d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1800 1524 1185ee73771569f4e29c468b69bbc52d.exe 91 PID 1524 wrote to memory of 1800 1524 1185ee73771569f4e29c468b69bbc52d.exe 91 PID 1524 wrote to memory of 1800 1524 1185ee73771569f4e29c468b69bbc52d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1185ee73771569f4e29c468b69bbc52d.exe"C:\Users\Admin\AppData\Local\Temp\1185ee73771569f4e29c468b69bbc52d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\1185ee73771569f4e29c468b69bbc52d.exeC:\Users\Admin\AppData\Local\Temp\1185ee73771569f4e29c468b69bbc52d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5a00947948991dad0b0a8ac890687ca21
SHA12deed7883f1d7dca872a046fe88d0a48734f9979
SHA256a7ad5d95d69c27b40f1e0e5b6af37dd82219fbca259a1d156f81b0c205123b32
SHA5121535926504c78180b1c6fad244c6ddfb33c736154e3421f7e1aa20acff98d227daa1651da524523b14bcc51c76b53d2005fc7a3fd0771c7321ede571c2a6d7d1