Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:12
Behavioral task
behavioral1
Sample
131a5f0eacbfbdf4f4c35e04b31c4fe1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
131a5f0eacbfbdf4f4c35e04b31c4fe1.exe
Resource
win10v2004-20231215-en
General
-
Target
131a5f0eacbfbdf4f4c35e04b31c4fe1.exe
-
Size
3.9MB
-
MD5
131a5f0eacbfbdf4f4c35e04b31c4fe1
-
SHA1
944d5afb4a98e1b56650fb414f2a11028320d3ab
-
SHA256
f5ecceb31b8e95fd9ea0cd41ebd4a20becf1bd34ee8500d1957246a2e0ef3f91
-
SHA512
76184847118a6f444e8c4e1ae3cf9b99f2b7649f32e6d3e2d3f446619a3da60c7f363810bed1f461a880df645503a2cc5fa7f9e9a5c12896e4fb38d6e80481e2
-
SSDEEP
98304:ziMj0LS+dgDVcaqlMgg3gnl/IVUt4pJWzZtIygg3gnl/IVUV:ziMj0e+Whlhgl/iwgWttJgl/iG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5048 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe -
resource yara_rule behavioral2/memory/4316-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023216-11.dat upx behavioral2/memory/5048-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4316 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4316 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe 5048 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 5048 4316 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe 47 PID 4316 wrote to memory of 5048 4316 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe 47 PID 4316 wrote to memory of 5048 4316 131a5f0eacbfbdf4f4c35e04b31c4fe1.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\131a5f0eacbfbdf4f4c35e04b31c4fe1.exe"C:\Users\Admin\AppData\Local\Temp\131a5f0eacbfbdf4f4c35e04b31c4fe1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\131a5f0eacbfbdf4f4c35e04b31c4fe1.exeC:\Users\Admin\AppData\Local\Temp\131a5f0eacbfbdf4f4c35e04b31c4fe1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD581dce5abb986b3cbb8eb98ee747acb8a
SHA16aba5a34ae028933dffdda75ff6e4e30227cdbd6
SHA256dda18bc034e7c8613c6d0579a5ae2d1b8c6a555842a6a47246adc19ff32b0ea5
SHA512aca5b4a90f2931cdd9f468cf90685f0c0f03c64004dd61792a14509e63e326064cc09a0208e1ea2b0049f56d52872208a3a7693f0166831227b59d9d9c4cdc0c