Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:40
Behavioral task
behavioral1
Sample
220a064f8506702ef9d9e829ebdf5d8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
220a064f8506702ef9d9e829ebdf5d8b.exe
Resource
win10v2004-20231215-en
General
-
Target
220a064f8506702ef9d9e829ebdf5d8b.exe
-
Size
1.3MB
-
MD5
220a064f8506702ef9d9e829ebdf5d8b
-
SHA1
caddf738eb2e439a981e5729de16cfdc41a30988
-
SHA256
bc67ecedbad5173af79c0cdf57295cabf63032c24a4a5fefb842ca573bf4b783
-
SHA512
2d3044bafd34dc60d1359bb50688f6b9ec2ef2adfa252e147f69462e4b3556c00ee711bca5b610d434dc45b49f28025476125d78841b5738bc3fdf2b8dab21a8
-
SSDEEP
24576:zqxuUkJNx4lRehW9fgU00ED3bEn/5QISvu6dmJoMxCNKcjBUMmoKvPm+HxU9/9Us:+4UkJN+lR0W9fTgCxQzNdDMxajB6m+He
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2272 220a064f8506702ef9d9e829ebdf5d8b.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 220a064f8506702ef9d9e829ebdf5d8b.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 220a064f8506702ef9d9e829ebdf5d8b.exe -
resource yara_rule behavioral1/memory/1352-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000a000000012256-10.dat upx behavioral1/files/0x000a000000012256-15.dat upx behavioral1/memory/1352-14-0x0000000003590000-0x0000000003A77000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 220a064f8506702ef9d9e829ebdf5d8b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1352 220a064f8506702ef9d9e829ebdf5d8b.exe 2272 220a064f8506702ef9d9e829ebdf5d8b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2272 1352 220a064f8506702ef9d9e829ebdf5d8b.exe 28 PID 1352 wrote to memory of 2272 1352 220a064f8506702ef9d9e829ebdf5d8b.exe 28 PID 1352 wrote to memory of 2272 1352 220a064f8506702ef9d9e829ebdf5d8b.exe 28 PID 1352 wrote to memory of 2272 1352 220a064f8506702ef9d9e829ebdf5d8b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe"C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exeC:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5a03ecd14886fd1dbf985b5e1c91bd61b
SHA12e4e0c2482de8f8ce842fbca5a52b450c7b5f92d
SHA25613ec0b11181c03564c6e2a0b13b3d260cff814ae666bdfd66b3684c81402a408
SHA51230bd22f1af5d0db33b53e442e84c78bdfc8953c750c802aef1d1cc0da683132fb49bec8221973a272cce442555317cec8e99ae311fdb0c1cde4eed57aa21404b
-
Filesize
412KB
MD5678aa27ed39ea3eec3830a7801be5042
SHA1b1ddc78d37b08420f9e69107a54cbe59171e8194
SHA25672af660dd6267692463687fdd16c1f1742d780d1b5a7dde31db027bd8efa6fb4
SHA512acf3d59893b68e0cfe3ec53448fd57d919a332b041e1cfb8f4f27b05f69dc1dacdd990453fcda105e58b113fe78039ae8a8788da70860791cb83167555caa485