Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
156be478e941d9108e031181ee0bf72a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
156be478e941d9108e031181ee0bf72a.exe
Resource
win10v2004-20231215-en
General
-
Target
156be478e941d9108e031181ee0bf72a.exe
-
Size
82KB
-
MD5
156be478e941d9108e031181ee0bf72a
-
SHA1
aeb2e689fbdc18283b74a39c9288c1e7c8f82788
-
SHA256
fa60642b7f2d5c443d7598b7ce9bb4bae9f6143b919f28b0e402ec890784653d
-
SHA512
a9528309f1b17558cbf4a53a87ab823f12f106a90a92142fd4eed84b32f8257a3f8e0bf6cfde943cc93a0d5521922909d7651dbbc9ee5761a937c5b110a8b45a
-
SSDEEP
1536:YSfnrWgK7Jk9LqJqBDfdLw/Dwp+Zv/heCiV9IUgYZaWve9YGCs7Fb6KOfj+Qsizc:YSfnrFmJk9vDfdSPhnijFgN4sJ6FjG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 156be478e941d9108e031181ee0bf72a.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 156be478e941d9108e031181ee0bf72a.exe -
Loads dropped DLL 1 IoCs
pid Process 2988 156be478e941d9108e031181ee0bf72a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2988 156be478e941d9108e031181ee0bf72a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 156be478e941d9108e031181ee0bf72a.exe 1528 156be478e941d9108e031181ee0bf72a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1528 2988 156be478e941d9108e031181ee0bf72a.exe 29 PID 2988 wrote to memory of 1528 2988 156be478e941d9108e031181ee0bf72a.exe 29 PID 2988 wrote to memory of 1528 2988 156be478e941d9108e031181ee0bf72a.exe 29 PID 2988 wrote to memory of 1528 2988 156be478e941d9108e031181ee0bf72a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\156be478e941d9108e031181ee0bf72a.exe"C:\Users\Admin\AppData\Local\Temp\156be478e941d9108e031181ee0bf72a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\156be478e941d9108e031181ee0bf72a.exeC:\Users\Admin\AppData\Local\Temp\156be478e941d9108e031181ee0bf72a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD58f00ab99fa09e9090bee6c9078ddc1c3
SHA1fa44579706118f97a033f089875ae85bc8b755c1
SHA256ae730dbbbd85e927bf23799ce9198b395a1226b5fe5cf8552a3dbbfac7d35003
SHA512d474d3301fd201ca7d4a036a2ac357ddd7ab2398d8377d0d902f759c0668c1b4c16195a47b35f89507dcd06bc6848953c2bbf8f214718d8722bbe1fce08e55b6