Analysis
-
max time kernel
88s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:18
Behavioral task
behavioral1
Sample
19be64629d344d40346307d7b77991ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19be64629d344d40346307d7b77991ce.exe
Resource
win10v2004-20231215-en
General
-
Target
19be64629d344d40346307d7b77991ce.exe
-
Size
1.3MB
-
MD5
19be64629d344d40346307d7b77991ce
-
SHA1
93dc2c4f3a9f337bf893cd0151c6dfd21357d926
-
SHA256
e159cde35e9e7101ce18d16081c3d5295946cc5f8096c0c475d24f3a141c528e
-
SHA512
8c1613af2011454c8a1608cd21da08a0665ac81f69f9636e213acedcb31c3bc47c859325a1c60addfec0f4aa371b1dd286e560f97f1ce46ecc02c3a5a670afca
-
SSDEEP
24576:S639vlSmT4sqPbOd3NWlELEgRX2YCMlzhpPiVcsep7xb4t/cyBsIfmV6hNpU9/9j:b39dz/qsNWlELEI7lFpP+cvyHBh9fKRt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4464 19be64629d344d40346307d7b77991ce.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 19be64629d344d40346307d7b77991ce.exe -
resource yara_rule behavioral2/memory/3368-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0006000000023217-11.dat upx behavioral2/memory/4464-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3368 19be64629d344d40346307d7b77991ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3368 19be64629d344d40346307d7b77991ce.exe 4464 19be64629d344d40346307d7b77991ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 4464 3368 19be64629d344d40346307d7b77991ce.exe 32 PID 3368 wrote to memory of 4464 3368 19be64629d344d40346307d7b77991ce.exe 32 PID 3368 wrote to memory of 4464 3368 19be64629d344d40346307d7b77991ce.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\19be64629d344d40346307d7b77991ce.exe"C:\Users\Admin\AppData\Local\Temp\19be64629d344d40346307d7b77991ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\19be64629d344d40346307d7b77991ce.exeC:\Users\Admin\AppData\Local\Temp\19be64629d344d40346307d7b77991ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5fd75c1151343ad794f7fbddd668ccd20
SHA12c09555082f482fd7b838e5f63f539781e756bcd
SHA2567f798602e229f01125d8965745d1e5190260ee04b585a8b73902186a7a7892fc
SHA5124dec8b9c55a2cd5d868b072a1698daebb50fef6f8633f7ad5a08c64c95b440282757014b6aa3ffd74b79292f4a6301bb95062b7b5a0e3443ebf180aa5c1fd975