Analysis

  • max time kernel
    89s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 10:04

General

  • Target

    154c109a9722f650367e7a063c23e93b.exe

  • Size

    82KB

  • MD5

    154c109a9722f650367e7a063c23e93b

  • SHA1

    56da0577e30d507f26cd31e348f27fe7c64600d7

  • SHA256

    c0ea916590690c32b1c085c4d62d4d782f4bea5d4d5344f4651e13ca61f9bac4

  • SHA512

    9271ece66e398e61b99fc6d2838decf6dacef5bf2ac19d89c25800346578e04b313fc72100014b4e10f7db56612254b24be73707080e2499ab2cea331a789956

  • SSDEEP

    1536:t2m8OcM0bujCrklWI0kZUYre5Bk/Dcnc2+30+UgvIJn:o9OVWr2L7ZUYrd/gc2E0+UbJn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe
    "C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe
      C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\154c109a9722f650367e7a063c23e93b.exe

          Filesize

          82KB

          MD5

          a7d1fd98e92b8291331952f8937f041b

          SHA1

          c414afa805245fda978e6384503adb91602b9d69

          SHA256

          6ba806eba70c1bca1f45a4f80063181feae59c4ef5047381ef29f0af6e2dbaff

          SHA512

          01e4f47ea9df8aa29d8e23b89958e82c98155d6f7bb9b256e853c1fc27ab89b7526f17ec6b978dcbb9741d68dba3d2f274338ac0dca07ce056a5a8c3e8990e38

        • memory/1044-13-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1044-15-0x00000000001D0000-0x00000000001FF000-memory.dmp

          Filesize

          188KB

        • memory/1044-20-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1044-24-0x0000000004D90000-0x0000000004DAB000-memory.dmp

          Filesize

          108KB

        • memory/3192-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3192-1-0x00000000000F0000-0x000000000011F000-memory.dmp

          Filesize

          188KB

        • memory/3192-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3192-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB