Analysis
-
max time kernel
145s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
1afa70e32e346e73166ea8e1afcf7f80.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1afa70e32e346e73166ea8e1afcf7f80.exe
Resource
win10v2004-20231215-en
General
-
Target
1afa70e32e346e73166ea8e1afcf7f80.exe
-
Size
92KB
-
MD5
1afa70e32e346e73166ea8e1afcf7f80
-
SHA1
4e9beaa7d1f1e3bbf2a86dbe4e9b9ea92c1352c9
-
SHA256
ed2df6ac5993702c467dd4e2602687b3a18b7915482f7478408748cdb2ea46d3
-
SHA512
b0fe40aa2764011105ed22f601bed7e3868e42b284f17ccd1c35d6a71d435ff99cde82cbbedf323c6a0c8e5a69670cc1f27a0b98ffda5a10ab563f098e5ae0b2
-
SSDEEP
1536:5IgEp7h23d8E6KIZCswCarH99surxYH2SHbBZdjsa:KgKYOE6bwsgH9/1YZbBZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 1afa70e32e346e73166ea8e1afcf7f80.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 1afa70e32e346e73166ea8e1afcf7f80.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3920 1afa70e32e346e73166ea8e1afcf7f80.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3920 1afa70e32e346e73166ea8e1afcf7f80.exe 2444 1afa70e32e346e73166ea8e1afcf7f80.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2444 3920 1afa70e32e346e73166ea8e1afcf7f80.exe 92 PID 3920 wrote to memory of 2444 3920 1afa70e32e346e73166ea8e1afcf7f80.exe 92 PID 3920 wrote to memory of 2444 3920 1afa70e32e346e73166ea8e1afcf7f80.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1afa70e32e346e73166ea8e1afcf7f80.exe"C:\Users\Admin\AppData\Local\Temp\1afa70e32e346e73166ea8e1afcf7f80.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\1afa70e32e346e73166ea8e1afcf7f80.exeC:\Users\Admin\AppData\Local\Temp\1afa70e32e346e73166ea8e1afcf7f80.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52fd00043817ec42512e29a70f79a9fab
SHA11976e74a3b91f4d5f0b9759f12f7d76257d9b9b8
SHA256f35d95b87b093a3240d0b634e620119ab2cf80cdcd2edd0f0a344b43bfa28db4
SHA512aba1638f109e06ddd338da6f2cb94518ae61c085a4f3be242deafcac0ce177a0532776583c7319ab453cfd8c1c8dc310a567635acae19e1f600c9e6e55f65ccb