Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 00:18

General

  • Target

    216e1d916d8feede14e6a44c42770717.exe

  • Size

    82KB

  • MD5

    216e1d916d8feede14e6a44c42770717

  • SHA1

    7192957806e56a402eb16bad22cb0ff6262aabc2

  • SHA256

    2276cb25be870d0b848caf6b4b7bf9ae5fedcbdc1424c2b77e6f99f46042e3d2

  • SHA512

    bc01632fbacf55e893164d1d35b871d5eedb0f62f7c910b4936233d1b78f0d05365bb982bf9c7f2442d9928ed86e02ad024e8fe24abf7fd6e702ab4ef35012fe

  • SSDEEP

    1536:CCy6I0nxbLeRLRcz9ZsQh3TznFpkb+8yXIoRQ2lAHtVTMXIlXyoeXXbWic15U6jE:CCykxww9Ph3nFpkbjoRQ0ANeUteHb/cU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe
    "C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe
      C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe

    Filesize

    82KB

    MD5

    d74c94ea13644eeb880e177eff0fa56e

    SHA1

    7a6dfbc2114bda1d16746f346b5dd4685e972cb2

    SHA256

    b179f2a93b3b577dfcdead15d52788ed591fcbdf20c36dc96e85c4302650448c

    SHA512

    4325918c10204fe95871a95347cadfef24353606b2e53152f5f8d69c2d1a5277c4bd3d25743f3f3d17d950803f047360361f3820f40a5ebb1492225f8c7f5159

  • memory/436-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/436-1-0x0000000001430000-0x000000000145F000-memory.dmp

    Filesize

    188KB

  • memory/436-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/436-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2628-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2628-15-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/2628-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2628-21-0x00000000014E0000-0x00000000014FB000-memory.dmp

    Filesize

    108KB