Analysis

  • max time kernel
    140s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 11:16

General

  • Target

    16ee5dcaba6da78ed138a2a60d83a24a.exe

  • Size

    84KB

  • MD5

    16ee5dcaba6da78ed138a2a60d83a24a

  • SHA1

    e929ed68d61c91776d2828989e7943161d0ce265

  • SHA256

    6d2ec9ad1bb6bd8df1ec0d8b6c66ed2d82c19eb155399e62268a318348fa68dd

  • SHA512

    745920d72e391fb2d5721c560d7135ecf0dcb3ba89c3c0cceb4cadb485ae651c3194243dab7815148f8749e891999031139e7a38202f1c07a0810e78a950536c

  • SSDEEP

    1536:ZPS0KlvfcITHzzPQJSr/Wcg+zwZ4u70bpXDVvytn/QaDMdsw81vGUd8Rr:5QfcITHYx+zwZZ0bponQmweTd8Z

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe
    "C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe
      C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe

    Filesize

    84KB

    MD5

    8a90537d5da72dbc0bc90b91a603ce9a

    SHA1

    391149b34a7444c024be37be079b05d15c24258f

    SHA256

    de7c734e4f8f3f4cbe1c57126b3d50b47cdbfc96f085ed1448bfe3dc4ae17e03

    SHA512

    c044c30f4ab7abc3f3707978869ad7196da1ce22c979139b55681232999c996831dae35c02b2c090fab9b11971e2c0f1306394086794951ebb2602f20c42a359

  • memory/3744-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3744-1-0x00000000001D0000-0x00000000001FF000-memory.dmp

    Filesize

    188KB

  • memory/3744-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3744-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4000-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4000-14-0x0000000001500000-0x000000000152F000-memory.dmp

    Filesize

    188KB

  • memory/4000-25-0x0000000004D90000-0x0000000004DAB000-memory.dmp

    Filesize

    108KB

  • memory/4000-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB