Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 14:05
Behavioral task
behavioral1
Sample
1aecce27ca47d2d444847405351c4c35.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1aecce27ca47d2d444847405351c4c35.exe
Resource
win10v2004-20231215-en
General
-
Target
1aecce27ca47d2d444847405351c4c35.exe
-
Size
1.5MB
-
MD5
1aecce27ca47d2d444847405351c4c35
-
SHA1
6b265bdab5671bf20174b6e56d2b04e414b81246
-
SHA256
7ba6d6660fcf4922d145c7499d0e9561ce2b5b2c16b4da89c128159ce6f45fa8
-
SHA512
b88f7484e7041c336902e77a7a6e9ea07d38a7257f591475a4efa0eaf6d7e00f671667a501d648e74b147dc8b23ddc82a15132c30aa89da1f02145d01aed34af
-
SSDEEP
24576:6bHkU/HaOL6WyfMqoE1qWFhdRedWxOBh76vBXz89XLZvxChmn98SFHM11zYgKyoU:zUPas6WyftoGqWFhdRedWxYAXzwXLZvX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3128 1aecce27ca47d2d444847405351c4c35.exe -
Executes dropped EXE 1 IoCs
pid Process 3128 1aecce27ca47d2d444847405351c4c35.exe -
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023217-11.dat upx behavioral2/memory/3128-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 1aecce27ca47d2d444847405351c4c35.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1988 1aecce27ca47d2d444847405351c4c35.exe 3128 1aecce27ca47d2d444847405351c4c35.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3128 1988 1aecce27ca47d2d444847405351c4c35.exe 89 PID 1988 wrote to memory of 3128 1988 1aecce27ca47d2d444847405351c4c35.exe 89 PID 1988 wrote to memory of 3128 1988 1aecce27ca47d2d444847405351c4c35.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aecce27ca47d2d444847405351c4c35.exe"C:\Users\Admin\AppData\Local\Temp\1aecce27ca47d2d444847405351c4c35.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\1aecce27ca47d2d444847405351c4c35.exeC:\Users\Admin\AppData\Local\Temp\1aecce27ca47d2d444847405351c4c35.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3128
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
919KB
MD516fcfe060cfa1c306ee5b86c435e4dae
SHA14a0fbdc96882be5c2ae4feee73f5eb8698936e9a
SHA256ca9339e210040acbe17dc7032262d447cc3b913c275e29161976069cec996dc4
SHA512ecd61fedae0e83655a5e0882406024129e1caf0ca131ebfcb534c70c69cec5ee1a0893b3e632172425102f29030be3bb156b787dfdbaec728a963c3def65b574