Analysis
-
max time kernel
142s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 11:20
Static task
static1
Behavioral task
behavioral1
Sample
16ff18c70be190df529a7ad54583f119.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16ff18c70be190df529a7ad54583f119.exe
Resource
win10v2004-20231215-en
General
-
Target
16ff18c70be190df529a7ad54583f119.exe
-
Size
105KB
-
MD5
16ff18c70be190df529a7ad54583f119
-
SHA1
eab10a2e17ebdea9e54965c3ed9999591a06cdf4
-
SHA256
5268fd47e9f0f36aa25a74530dc3945a2a4f1965ba7c97a7fcc42036d6246e01
-
SHA512
d3c38832659199ce9da35f2d04955b0d07c0932de3d06cd8404122a9fa210ffcd24a46756b4c232e60ff91080509dc87b1770d63edb8e591b874825a6702b28d
-
SSDEEP
1536:DaPIBGsbYjYA7OTrYWEuDxspXIVUmo9XU2a6ifj7AiTt6DtW9YH:ePIBsZ7O3L9xsp4fo9Afj7KpW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1536 16ff18c70be190df529a7ad54583f119.exe -
Executes dropped EXE 1 IoCs
pid Process 1536 16ff18c70be190df529a7ad54583f119.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3288 16ff18c70be190df529a7ad54583f119.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3288 16ff18c70be190df529a7ad54583f119.exe 1536 16ff18c70be190df529a7ad54583f119.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3288 wrote to memory of 1536 3288 16ff18c70be190df529a7ad54583f119.exe 93 PID 3288 wrote to memory of 1536 3288 16ff18c70be190df529a7ad54583f119.exe 93 PID 3288 wrote to memory of 1536 3288 16ff18c70be190df529a7ad54583f119.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ff18c70be190df529a7ad54583f119.exe"C:\Users\Admin\AppData\Local\Temp\16ff18c70be190df529a7ad54583f119.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\16ff18c70be190df529a7ad54583f119.exeC:\Users\Admin\AppData\Local\Temp\16ff18c70be190df529a7ad54583f119.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5c832c43c0389586caa55aeff3848ff4e
SHA10edc37c40afbe44315a9c2867836446af29739a1
SHA25675c4c7e0412b7e67fff68d95af41ea6d2af6073e9d6f9b45535b83fee8fa6c5d
SHA5126127a7dd078a3d36ba67ef2698078f899d917f7989be362bf5ec03f8b2ed603348b768b0f953af722792dea75541ce3534b1b1c657a91a3a8d21ee3f4300c668