Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:38
Static task
static1
Behavioral task
behavioral1
Sample
162a318656324c0337656ace4ae1a85d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
162a318656324c0337656ace4ae1a85d.exe
Resource
win10v2004-20231222-en
General
-
Target
162a318656324c0337656ace4ae1a85d.exe
-
Size
82KB
-
MD5
162a318656324c0337656ace4ae1a85d
-
SHA1
606e4262c56fb21eb56b61efec4de106a79f0fb5
-
SHA256
f6e43afb45d4d929530afb0f600e95c4df8d2f519b625b6dbc1f1a0203ca6983
-
SHA512
d6b7693a42f9c13a1954c52834705bfd2378912b8345664c7d54303a8846fa33649ad4d4c6c6f394076b83f646bd8dd82b64ab70d805f5510f39782b496824cb
-
SSDEEP
1536:xQLRkdHaOaCXNOOsfwXHexV+HmMcYyKUA+mBa+7CoW1JUZm4v9IU3n+i35eXQ:xRdHTLwOsMHkV88BmB97CoW10933nBwA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 162a318656324c0337656ace4ae1a85d.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 162a318656324c0337656ace4ae1a85d.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 162a318656324c0337656ace4ae1a85d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 162a318656324c0337656ace4ae1a85d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 162a318656324c0337656ace4ae1a85d.exe 2068 162a318656324c0337656ace4ae1a85d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2068 1984 162a318656324c0337656ace4ae1a85d.exe 29 PID 1984 wrote to memory of 2068 1984 162a318656324c0337656ace4ae1a85d.exe 29 PID 1984 wrote to memory of 2068 1984 162a318656324c0337656ace4ae1a85d.exe 29 PID 1984 wrote to memory of 2068 1984 162a318656324c0337656ace4ae1a85d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe"C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exeC:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD52d31c02964809450a74f4e2af74d8db9
SHA15ba3f980cf677a5240a5951418598551aaa36743
SHA256d352f5dcaeeba4e608847f3ab5241c46e6d57a2358abded076d5e90ecd29249a
SHA512c9017cffc3d91a9861f202156a59f711fd3f43c31b88176fd1efbdbb4dc018326c6d3fd94b2cf436a048b13da713ba7e8196985011be255ca3fa417251df49e6