Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 12:19
Static task
static1
Behavioral task
behavioral1
Sample
184849970dc094bfb378f9d554c2d44a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
184849970dc094bfb378f9d554c2d44a.exe
Resource
win10v2004-20231215-en
General
-
Target
184849970dc094bfb378f9d554c2d44a.exe
-
Size
57KB
-
MD5
184849970dc094bfb378f9d554c2d44a
-
SHA1
ccf23ed0139bed6bfa7f9a2ca63b2f50bbd88330
-
SHA256
7628ca0bd4fd6beca1d7613a223fad8a5425860a5d178510cb8994245aaeb2b0
-
SHA512
1122baa654a22cca8b078969cafa8d54383d4b4c6c0c5bbc6f94b1dd2b901a0ba0060a0430a3ca6c36970f45e665e07db6a8a2b2f4efac28f6b49a33b771737d
-
SSDEEP
1536:8VWjc2FszzIJkiUOhrTz0aRHWPm656EBe4/b+C:hA2SzEJdUOpf0aRHWPXn5f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 184849970dc094bfb378f9d554c2d44a.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 184849970dc094bfb378f9d554c2d44a.exe -
Loads dropped DLL 1 IoCs
pid Process 2780 184849970dc094bfb378f9d554c2d44a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2780 184849970dc094bfb378f9d554c2d44a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2780 184849970dc094bfb378f9d554c2d44a.exe 2808 184849970dc094bfb378f9d554c2d44a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2808 2780 184849970dc094bfb378f9d554c2d44a.exe 29 PID 2780 wrote to memory of 2808 2780 184849970dc094bfb378f9d554c2d44a.exe 29 PID 2780 wrote to memory of 2808 2780 184849970dc094bfb378f9d554c2d44a.exe 29 PID 2780 wrote to memory of 2808 2780 184849970dc094bfb378f9d554c2d44a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\184849970dc094bfb378f9d554c2d44a.exe"C:\Users\Admin\AppData\Local\Temp\184849970dc094bfb378f9d554c2d44a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\184849970dc094bfb378f9d554c2d44a.exeC:\Users\Admin\AppData\Local\Temp\184849970dc094bfb378f9d554c2d44a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD56a542c6cc790503951c3c65d87228274
SHA1d223c3e809a32086409ea0d96a7c31a4c0730fc0
SHA256ff3febca99dd0171b6f44e2f07db1607b091b841833ff6a968f7b2344aee0290
SHA5120e46b8805cbca4f5bf171bf85b1cc9e192b128dccafdd9f3ef5e919fe453a45e367678c9badad6ca25e307034b76be474e140074049dc40cabae03506f717161