Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:18

General

  • Target

    15ab7c46b8bad640bf8861564f85ba4a.exe

  • Size

    84KB

  • MD5

    15ab7c46b8bad640bf8861564f85ba4a

  • SHA1

    b9318f13b27c5ed86f10c983e7f1ca0c7f5f2bd9

  • SHA256

    48ad67d2a9e160a6b0ba134763042acd533b2695a5bb55c33672dc16a5a7ed65

  • SHA512

    b60653392f21b2f82a6bdf91263b63800e7406e78288674e4d29d32d1b3b6aefdd774b174b3cb4dbdab8951935c3e74ae1935f11f994ce0afeb1d7d5e5212ca1

  • SSDEEP

    1536:ilwaj/rDaaeW6qAwWNlJLPqXTj3+ZfsSlMTMoqHhrK+dJ/UNp3LN8h:WDjncDqf3+9fhO+i3LY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe
    "C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe
      C:\Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\15ab7c46b8bad640bf8861564f85ba4a.exe

    Filesize

    84KB

    MD5

    0e9e5fd2e8f687eb24ba8bd5ab5e028f

    SHA1

    77076a6869057c29e398bbc48d55bf03bb0f1630

    SHA256

    d338ac575e5529510b5f9b9cccf3c1b70ddbb95e8e8c6e8a349f86e3634d6841

    SHA512

    b99c28a9c3d5f8fdcc6ba858be9794419805c4626faa8ca84a3476f60406ae4fe36215a2ded58fee6e93bf155343e69609fc42e2733f32f8deb0fa4a60cc4d6f

  • memory/2728-20-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2728-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2728-28-0x0000000000230000-0x000000000024B000-memory.dmp

    Filesize

    108KB

  • memory/3048-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3048-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3048-5-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/3048-11-0x0000000000190000-0x00000000001BF000-memory.dmp

    Filesize

    188KB

  • memory/3048-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB