Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
168cc96cb8d54d3eb3109aad2f1c36bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
168cc96cb8d54d3eb3109aad2f1c36bc.exe
Resource
win10v2004-20231215-en
General
-
Target
168cc96cb8d54d3eb3109aad2f1c36bc.exe
-
Size
84KB
-
MD5
168cc96cb8d54d3eb3109aad2f1c36bc
-
SHA1
f50c5881c7f75e053f45dccad638048b2d6c6ce0
-
SHA256
77d15b1f4c9cfdd23fc19fa447c790f0ca23e52160dd5a6997a599e7ff2c65a5
-
SHA512
ec3b84461c3f36ba77b9b59a6495e367b5ed9915413557d6499a07668de0ca1216b5f184838410a0281ed88bdd48af5ef5255d5e05f3a8707b51f6b4406156b1
-
SSDEEP
1536:D34XAL6OBb2040cFyPHK7v8KbqZirmN5h0eYHoZ9Da9+X4ok8VAyqRyqHm:D34XAL6ON940cFyPq7v8eqZirmN5qH+F
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 168cc96cb8d54d3eb3109aad2f1c36bc.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 168cc96cb8d54d3eb3109aad2f1c36bc.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe 2816 168cc96cb8d54d3eb3109aad2f1c36bc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2816 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe 29 PID 2184 wrote to memory of 2816 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe 29 PID 2184 wrote to memory of 2816 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe 29 PID 2184 wrote to memory of 2816 2184 168cc96cb8d54d3eb3109aad2f1c36bc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\168cc96cb8d54d3eb3109aad2f1c36bc.exe"C:\Users\Admin\AppData\Local\Temp\168cc96cb8d54d3eb3109aad2f1c36bc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\168cc96cb8d54d3eb3109aad2f1c36bc.exeC:\Users\Admin\AppData\Local\Temp\168cc96cb8d54d3eb3109aad2f1c36bc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD516bc38f7df29785ac07e3e014d49ab2d
SHA122be061b406db1023f5737ac344e52ee133d4100
SHA25676b679c7bdbbe5da32d0a811c039c453972c76a65ac6558d286af32753dbbd81
SHA512eecce2d1a187540a2ce500f9775170e20792219e5f77885218e147e96897b7b7bcf77fd08a83e88db4f630320d8e404fdfabde7e384d2f179e8516ef24c25f7d