Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:15
Static task
static1
Behavioral task
behavioral1
Sample
19ac66c00d1dace71b9a7f74bbbb42e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19ac66c00d1dace71b9a7f74bbbb42e5.exe
Resource
win10v2004-20231215-en
General
-
Target
19ac66c00d1dace71b9a7f74bbbb42e5.exe
-
Size
82KB
-
MD5
19ac66c00d1dace71b9a7f74bbbb42e5
-
SHA1
0877a76153b522bc053d790b2e4c64bb0b045b7e
-
SHA256
c59fdcad9a0aa6cf397ec8e44d0006bba131b87a41f6e4ace1f203ec74de46a6
-
SHA512
4bbcaf882453910180938010450fa307de3d5b02ca0be288b813577cb019249341704ad1855b7b06b8803110272f8172f7e60812674201dbc5f792d94374f855
-
SSDEEP
1536:nE2ybed9KXI50EBlsBAGUmK0F98Bvy1amNiOT8t4YnKO:nubekI5TseGmjmjwKO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1540 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Executes dropped EXE 1 IoCs
pid Process 1540 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Loads dropped DLL 1 IoCs
pid Process 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe 1540 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1540 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe 17 PID 2444 wrote to memory of 1540 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe 17 PID 2444 wrote to memory of 1540 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe 17 PID 2444 wrote to memory of 1540 2444 19ac66c00d1dace71b9a7f74bbbb42e5.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe"C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exeC:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5009144ff620dcac9b47fdc45fa8ffcc3
SHA11d1c763f2559bc89b4fecd3c7f6a18a8cdb3c44a
SHA2564b39b2d17d3aecea6a7091f2bf6ec355cd74974755d61d3b8cf196381c09e83c
SHA51232ecf97b31267a25d7bccad93b7c372a15e4172485e80a55ef62d043a418d07e6113cbbc0283c88e64d3f37c5ad92a48cd5c01c4622b7ccaafb6adfd147a0ba6