Analysis
-
max time kernel
89s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
154c109a9722f650367e7a063c23e93b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
154c109a9722f650367e7a063c23e93b.exe
Resource
win10v2004-20231215-en
General
-
Target
154c109a9722f650367e7a063c23e93b.exe
-
Size
82KB
-
MD5
154c109a9722f650367e7a063c23e93b
-
SHA1
56da0577e30d507f26cd31e348f27fe7c64600d7
-
SHA256
c0ea916590690c32b1c085c4d62d4d782f4bea5d4d5344f4651e13ca61f9bac4
-
SHA512
9271ece66e398e61b99fc6d2838decf6dacef5bf2ac19d89c25800346578e04b313fc72100014b4e10f7db56612254b24be73707080e2499ab2cea331a789956
-
SSDEEP
1536:t2m8OcM0bujCrklWI0kZUYre5Bk/Dcnc2+30+UgvIJn:o9OVWr2L7ZUYrd/gc2E0+UbJn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1044 154c109a9722f650367e7a063c23e93b.exe -
Executes dropped EXE 1 IoCs
pid Process 1044 154c109a9722f650367e7a063c23e93b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3192 154c109a9722f650367e7a063c23e93b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3192 154c109a9722f650367e7a063c23e93b.exe 1044 154c109a9722f650367e7a063c23e93b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 1044 3192 154c109a9722f650367e7a063c23e93b.exe 88 PID 3192 wrote to memory of 1044 3192 154c109a9722f650367e7a063c23e93b.exe 88 PID 3192 wrote to memory of 1044 3192 154c109a9722f650367e7a063c23e93b.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe"C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exeC:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a7d1fd98e92b8291331952f8937f041b
SHA1c414afa805245fda978e6384503adb91602b9d69
SHA2566ba806eba70c1bca1f45a4f80063181feae59c4ef5047381ef29f0af6e2dbaff
SHA51201e4f47ea9df8aa29d8e23b89958e82c98155d6f7bb9b256e853c1fc27ab89b7526f17ec6b978dcbb9741d68dba3d2f274338ac0dca07ce056a5a8c3e8990e38