Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:32
Static task
static1
Behavioral task
behavioral1
Sample
12385b6c626b12cbef8699ec9b738dbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12385b6c626b12cbef8699ec9b738dbd.exe
Resource
win10v2004-20231215-en
General
-
Target
12385b6c626b12cbef8699ec9b738dbd.exe
-
Size
82KB
-
MD5
12385b6c626b12cbef8699ec9b738dbd
-
SHA1
80836a51c90c0df8a1580f033f854a45f34816fc
-
SHA256
6a2ca68e719efcfad66d1654f5a0a887784c2b19b4d55e4819d3735f1078fb28
-
SHA512
62bcf614cbcbe41150124e13ea5c718d276474aff3731e51c36fb5b8bf9597aa079e5fce5b9c39c8e841df2065c175ea82b18d97601bcf8ed5094f6402f954d5
-
SSDEEP
1536:wNAXczlJUajHMc4IiZ0wBSaNlVNCKw4EiCXEbzxoOK8Ays1I8Od:bMB+5c490ALVNCKPbiGK8Ays17+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 12385b6c626b12cbef8699ec9b738dbd.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2744 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2744 12385b6c626b12cbef8699ec9b738dbd.exe 1668 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1668 2744 12385b6c626b12cbef8699ec9b738dbd.exe 24 PID 2744 wrote to memory of 1668 2744 12385b6c626b12cbef8699ec9b738dbd.exe 24 PID 2744 wrote to memory of 1668 2744 12385b6c626b12cbef8699ec9b738dbd.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe"C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exeC:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD545db7378dcf4c44ac1389a0e87faef3d
SHA14cf60243ad4d7efd2b190b3eaf64739a821c3476
SHA25663d24bf99b13a2b8cf06be8d63018ea08350c4f06cb3c7700a9e07141fd5df70
SHA51279c4c04eb5b61f2089aa1f5eaa5553816045fc22018fbf33b40cf71c942924fa6f260b0d5b91ebf51a140bdd8b132a93ed17d26c33a41c175b6ee25707c5b5f7