Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
15ab7c46b8bad640bf8861564f85ba4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15ab7c46b8bad640bf8861564f85ba4a.exe
Resource
win10v2004-20231215-en
General
-
Target
15ab7c46b8bad640bf8861564f85ba4a.exe
-
Size
84KB
-
MD5
15ab7c46b8bad640bf8861564f85ba4a
-
SHA1
b9318f13b27c5ed86f10c983e7f1ca0c7f5f2bd9
-
SHA256
48ad67d2a9e160a6b0ba134763042acd533b2695a5bb55c33672dc16a5a7ed65
-
SHA512
b60653392f21b2f82a6bdf91263b63800e7406e78288674e4d29d32d1b3b6aefdd774b174b3cb4dbdab8951935c3e74ae1935f11f994ce0afeb1d7d5e5212ca1
-
SSDEEP
1536:ilwaj/rDaaeW6qAwWNlJLPqXTj3+ZfsSlMTMoqHhrK+dJ/UNp3LN8h:WDjncDqf3+9fhO+i3LY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 15ab7c46b8bad640bf8861564f85ba4a.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 15ab7c46b8bad640bf8861564f85ba4a.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 15ab7c46b8bad640bf8861564f85ba4a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 15ab7c46b8bad640bf8861564f85ba4a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 15ab7c46b8bad640bf8861564f85ba4a.exe 2728 15ab7c46b8bad640bf8861564f85ba4a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2728 3048 15ab7c46b8bad640bf8861564f85ba4a.exe 29 PID 3048 wrote to memory of 2728 3048 15ab7c46b8bad640bf8861564f85ba4a.exe 29 PID 3048 wrote to memory of 2728 3048 15ab7c46b8bad640bf8861564f85ba4a.exe 29 PID 3048 wrote to memory of 2728 3048 15ab7c46b8bad640bf8861564f85ba4a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe"C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exeC:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2728
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD50e9e5fd2e8f687eb24ba8bd5ab5e028f
SHA177076a6869057c29e398bbc48d55bf03bb0f1630
SHA256d338ac575e5529510b5f9b9cccf3c1b70ddbb95e8e8c6e8a349f86e3634d6841
SHA512b99c28a9c3d5f8fdcc6ba858be9794419805c4626faa8ca84a3476f60406ae4fe36215a2ded58fee6e93bf155343e69609fc42e2733f32f8deb0fa4a60cc4d6f