Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:38
Static task
static1
Behavioral task
behavioral1
Sample
162a318656324c0337656ace4ae1a85d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
162a318656324c0337656ace4ae1a85d.exe
Resource
win10v2004-20231222-en
General
-
Target
162a318656324c0337656ace4ae1a85d.exe
-
Size
82KB
-
MD5
162a318656324c0337656ace4ae1a85d
-
SHA1
606e4262c56fb21eb56b61efec4de106a79f0fb5
-
SHA256
f6e43afb45d4d929530afb0f600e95c4df8d2f519b625b6dbc1f1a0203ca6983
-
SHA512
d6b7693a42f9c13a1954c52834705bfd2378912b8345664c7d54303a8846fa33649ad4d4c6c6f394076b83f646bd8dd82b64ab70d805f5510f39782b496824cb
-
SSDEEP
1536:xQLRkdHaOaCXNOOsfwXHexV+HmMcYyKUA+mBa+7CoW1JUZm4v9IU3n+i35eXQ:xRdHTLwOsMHkV88BmB97CoW10933nBwA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4140 162a318656324c0337656ace4ae1a85d.exe -
Executes dropped EXE 1 IoCs
pid Process 4140 162a318656324c0337656ace4ae1a85d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1584 162a318656324c0337656ace4ae1a85d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1584 162a318656324c0337656ace4ae1a85d.exe 4140 162a318656324c0337656ace4ae1a85d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4140 1584 162a318656324c0337656ace4ae1a85d.exe 90 PID 1584 wrote to memory of 4140 1584 162a318656324c0337656ace4ae1a85d.exe 90 PID 1584 wrote to memory of 4140 1584 162a318656324c0337656ace4ae1a85d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe"C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exeC:\Users\Admin\AppData\Local\Temp\162a318656324c0337656ace4ae1a85d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5501a4fefcb73edf58194ae04dac44439
SHA18b0be7cde7482ac1027e89fa94aef49764217dea
SHA2567dbcb368516f58d08dec5c02e98374d2bcf409a4eb11e7a13a3a55c37f2102e1
SHA51236eac7d0419e3da27c5f2ad7da4c648e50f70f3b2352504920e42cb14d79bc124646a96d58160e3caac19eb7cd2d5d3a8f345d166e2b435cbc5f862b1195ce6e