Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:04
Behavioral task
behavioral1
Sample
17f5cec31cb91db25ea8c6bf2c20df78.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17f5cec31cb91db25ea8c6bf2c20df78.exe
Resource
win10v2004-20231215-en
General
-
Target
17f5cec31cb91db25ea8c6bf2c20df78.exe
-
Size
59KB
-
MD5
17f5cec31cb91db25ea8c6bf2c20df78
-
SHA1
c02a2bd2333155a413c5415a9c64f8ebead825c7
-
SHA256
93cd59a2746ecba4d0f5e3e5483b45a33c86920cee2225626363018bcfc8563c
-
SHA512
89a014332f1f79a54fe3e2bc7dd2279cfe3a9562c6250e9d08b712e47aed03c074023ff448aca908b80cab36d37a6fdab4f24ae8a9ac4c49b7ac138315fe7f49
-
SSDEEP
1536:leoCZh9t23YQoBkFFUD+kWcPD9Q3EPpWzphpa:Q9k3oBsLkWxEBiphI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1688 17f5cec31cb91db25ea8c6bf2c20df78.exe -
Executes dropped EXE 1 IoCs
pid Process 1688 17f5cec31cb91db25ea8c6bf2c20df78.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe -
resource yara_rule behavioral1/memory/3008-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000800000001224a-10.dat upx behavioral1/memory/1688-17-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/3008-14-0x0000000000160000-0x000000000019D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe 1688 17f5cec31cb91db25ea8c6bf2c20df78.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1688 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe 29 PID 3008 wrote to memory of 1688 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe 29 PID 3008 wrote to memory of 1688 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe 29 PID 3008 wrote to memory of 1688 3008 17f5cec31cb91db25ea8c6bf2c20df78.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe"C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exeC:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1688
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD567b246ededd00b252a4ca5fb76f303ad
SHA1a302e914f90ec11bc8549c7f1e84ac95550a14f0
SHA25647f4f7d380ba05e6b40ac4c2387e7e88b635ce477e52091d759d258ec154e38b
SHA512e9b72293ee23e4f50753ae159abe74695180bca4ebf9122a60f851e6c4036effa94b19fb4a3df1ebad99a0336004d0a5fdfb9b3f2a272f621e24b7c5a09a986f