Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 09:57
Static task
static1
Behavioral task
behavioral1
Sample
152292a4a231f1676a5e56af7c057f2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
152292a4a231f1676a5e56af7c057f2f.exe
Resource
win10v2004-20231222-en
General
-
Target
152292a4a231f1676a5e56af7c057f2f.exe
-
Size
82KB
-
MD5
152292a4a231f1676a5e56af7c057f2f
-
SHA1
71660d9a8be3b0e9ef804f5aadb41c1662aa8162
-
SHA256
630e4e1f20d796401b6770643322cd99bed066f75b89c80ff46ea1a418d2169d
-
SHA512
833db15688a1ad89f35765de4c9ffbc072603c47e0bc40149070007cadc125c24f46a9c2b434270211a5f8fe6d702bd56a4eae6f905e6cef462d6de3e6ef7fa6
-
SSDEEP
1536:+mJ6g7NqEL5mbydXZx5TmJcpTW6ki/7ho/c4H1:+6NqEL5XB5TmJcViCC/cY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 152292a4a231f1676a5e56af7c057f2f.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 152292a4a231f1676a5e56af7c057f2f.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 152292a4a231f1676a5e56af7c057f2f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 152292a4a231f1676a5e56af7c057f2f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2756 152292a4a231f1676a5e56af7c057f2f.exe 3016 152292a4a231f1676a5e56af7c057f2f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 3016 2756 152292a4a231f1676a5e56af7c057f2f.exe 31 PID 2756 wrote to memory of 3016 2756 152292a4a231f1676a5e56af7c057f2f.exe 31 PID 2756 wrote to memory of 3016 2756 152292a4a231f1676a5e56af7c057f2f.exe 31 PID 2756 wrote to memory of 3016 2756 152292a4a231f1676a5e56af7c057f2f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\152292a4a231f1676a5e56af7c057f2f.exe"C:\Users\Admin\AppData\Local\Temp\152292a4a231f1676a5e56af7c057f2f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\152292a4a231f1676a5e56af7c057f2f.exeC:\Users\Admin\AppData\Local\Temp\152292a4a231f1676a5e56af7c057f2f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c8d1e39d01487c3c82daba9739af5883
SHA1dddac72674e9d0e7b50bbcd425e7d6bdfab46dc6
SHA25612a71a6f0d11027f0f543b9afdc4e32a84a67b44874d8c3020040f77cc1b141f
SHA512d19b917fd4ee5e645ea2456383807bda6c12855c769b9cb4b8dc7e68034cb1cf1d8a9790ce38810dfda2699c5c508938748ab8aa4305acd4f078e7a04f30f94e