Analysis
-
max time kernel
140s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 11:16
Static task
static1
Behavioral task
behavioral1
Sample
16ee5dcaba6da78ed138a2a60d83a24a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16ee5dcaba6da78ed138a2a60d83a24a.exe
Resource
win10v2004-20231215-en
General
-
Target
16ee5dcaba6da78ed138a2a60d83a24a.exe
-
Size
84KB
-
MD5
16ee5dcaba6da78ed138a2a60d83a24a
-
SHA1
e929ed68d61c91776d2828989e7943161d0ce265
-
SHA256
6d2ec9ad1bb6bd8df1ec0d8b6c66ed2d82c19eb155399e62268a318348fa68dd
-
SHA512
745920d72e391fb2d5721c560d7135ecf0dcb3ba89c3c0cceb4cadb485ae651c3194243dab7815148f8749e891999031139e7a38202f1c07a0810e78a950536c
-
SSDEEP
1536:ZPS0KlvfcITHzzPQJSr/Wcg+zwZ4u70bpXDVvytn/QaDMdsw81vGUd8Rr:5QfcITHYx+zwZZ0bponQmweTd8Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4000 16ee5dcaba6da78ed138a2a60d83a24a.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 16ee5dcaba6da78ed138a2a60d83a24a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3744 16ee5dcaba6da78ed138a2a60d83a24a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3744 16ee5dcaba6da78ed138a2a60d83a24a.exe 4000 16ee5dcaba6da78ed138a2a60d83a24a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4000 3744 16ee5dcaba6da78ed138a2a60d83a24a.exe 92 PID 3744 wrote to memory of 4000 3744 16ee5dcaba6da78ed138a2a60d83a24a.exe 92 PID 3744 wrote to memory of 4000 3744 16ee5dcaba6da78ed138a2a60d83a24a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe"C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exeC:\Users\Admin\AppData\Local\Temp\16ee5dcaba6da78ed138a2a60d83a24a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58a90537d5da72dbc0bc90b91a603ce9a
SHA1391149b34a7444c024be37be079b05d15c24258f
SHA256de7c734e4f8f3f4cbe1c57126b3d50b47cdbfc96f085ed1448bfe3dc4ae17e03
SHA512c044c30f4ab7abc3f3707978869ad7196da1ce22c979139b55681232999c996831dae35c02b2c090fab9b11971e2c0f1306394086794951ebb2602f20c42a359