Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:15
Static task
static1
Behavioral task
behavioral1
Sample
19ac66c00d1dace71b9a7f74bbbb42e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19ac66c00d1dace71b9a7f74bbbb42e5.exe
Resource
win10v2004-20231215-en
General
-
Target
19ac66c00d1dace71b9a7f74bbbb42e5.exe
-
Size
82KB
-
MD5
19ac66c00d1dace71b9a7f74bbbb42e5
-
SHA1
0877a76153b522bc053d790b2e4c64bb0b045b7e
-
SHA256
c59fdcad9a0aa6cf397ec8e44d0006bba131b87a41f6e4ace1f203ec74de46a6
-
SHA512
4bbcaf882453910180938010450fa307de3d5b02ca0be288b813577cb019249341704ad1855b7b06b8803110272f8172f7e60812674201dbc5f792d94374f855
-
SSDEEP
1536:nE2ybed9KXI50EBlsBAGUmK0F98Bvy1amNiOT8t4YnKO:nubekI5TseGmjmjwKO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4476 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4476 19ac66c00d1dace71b9a7f74bbbb42e5.exe 2800 19ac66c00d1dace71b9a7f74bbbb42e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2800 4476 19ac66c00d1dace71b9a7f74bbbb42e5.exe 28 PID 4476 wrote to memory of 2800 4476 19ac66c00d1dace71b9a7f74bbbb42e5.exe 28 PID 4476 wrote to memory of 2800 4476 19ac66c00d1dace71b9a7f74bbbb42e5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe"C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exeC:\Users\Admin\AppData\Local\Temp\19ac66c00d1dace71b9a7f74bbbb42e5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b96bcdd4f3d161955365f83147be6886
SHA1383970beda80d82c7dc7f7947510ba0054ddc5cd
SHA25690f2c9fb892fab69d7e57a7234b3622eccf0b8e344613301aa67f7cc4bbd4856
SHA512b85bf316a564e11f2464dad25bf433eeca1c23d264fbcbd0045e2f59f1a5da9c9597c955a56beef0bb287baafa775dcadd299e278dd364d67c5dc5451771a4e7