Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 20:18
Behavioral task
behavioral1
Sample
1bb3c892c331c5780b9e683bb0168850.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bb3c892c331c5780b9e683bb0168850.exe
Resource
win10v2004-20231215-en
General
-
Target
1bb3c892c331c5780b9e683bb0168850.exe
-
Size
1.3MB
-
MD5
1bb3c892c331c5780b9e683bb0168850
-
SHA1
da036ae00954b204c6ce49f14e410f4948a14345
-
SHA256
ad4f01cf8b4cdea813e742dc0139de278e9861a721331fbedff2d351bda0e48b
-
SHA512
27b6a7468da3d6d7235cae281a66f1d76bd52da76cd04726684252df02049a7280c7f5d2c12d5431e32209452e6ba6c09cd32704f007261de2a777db8b2d581d
-
SSDEEP
24576:Ln6SKfdKu07VkowaMV4YSCrqvO4P6Yjf+LBAxvG:L69sXVZUNWJPRiLBA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5096 1bb3c892c331c5780b9e683bb0168850.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 1bb3c892c331c5780b9e683bb0168850.exe -
resource yara_rule behavioral2/memory/2452-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e982-12.dat upx behavioral2/memory/5096-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2452 1bb3c892c331c5780b9e683bb0168850.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2452 1bb3c892c331c5780b9e683bb0168850.exe 5096 1bb3c892c331c5780b9e683bb0168850.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2452 wrote to memory of 5096 2452 1bb3c892c331c5780b9e683bb0168850.exe 88 PID 2452 wrote to memory of 5096 2452 1bb3c892c331c5780b9e683bb0168850.exe 88 PID 2452 wrote to memory of 5096 2452 1bb3c892c331c5780b9e683bb0168850.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb3c892c331c5780b9e683bb0168850.exe"C:\Users\Admin\AppData\Local\Temp\1bb3c892c331c5780b9e683bb0168850.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\1bb3c892c331c5780b9e683bb0168850.exeC:\Users\Admin\AppData\Local\Temp\1bb3c892c331c5780b9e683bb0168850.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5e014ba5ece178ad093449c898dd9a617
SHA1629f7ac28c52d0948b0a54bbab16277f338b6493
SHA2568bed1c1b652d0443c089e7a78d67b7bb49b1a7ed226d405e82466a3daade382d
SHA512f2c53110578ff579414022926eda87a1be768436eb927d4e55eade70e710f2d834b44cbd611e9919dd7205cc3c9fdecb8acfb41133ef1ef70ff6f37d8cae024d