Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
216e1d916d8feede14e6a44c42770717.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
216e1d916d8feede14e6a44c42770717.exe
Resource
win10v2004-20231215-en
General
-
Target
216e1d916d8feede14e6a44c42770717.exe
-
Size
82KB
-
MD5
216e1d916d8feede14e6a44c42770717
-
SHA1
7192957806e56a402eb16bad22cb0ff6262aabc2
-
SHA256
2276cb25be870d0b848caf6b4b7bf9ae5fedcbdc1424c2b77e6f99f46042e3d2
-
SHA512
bc01632fbacf55e893164d1d35b871d5eedb0f62f7c910b4936233d1b78f0d05365bb982bf9c7f2442d9928ed86e02ad024e8fe24abf7fd6e702ab4ef35012fe
-
SSDEEP
1536:CCy6I0nxbLeRLRcz9ZsQh3TznFpkb+8yXIoRQ2lAHtVTMXIlXyoeXXbWic15U6jE:CCykxww9Ph3nFpkbjoRQ0ANeUteHb/cU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 216e1d916d8feede14e6a44c42770717.exe -
Executes dropped EXE 1 IoCs
pid Process 2628 216e1d916d8feede14e6a44c42770717.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 436 216e1d916d8feede14e6a44c42770717.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 436 216e1d916d8feede14e6a44c42770717.exe 2628 216e1d916d8feede14e6a44c42770717.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 2628 436 216e1d916d8feede14e6a44c42770717.exe 90 PID 436 wrote to memory of 2628 436 216e1d916d8feede14e6a44c42770717.exe 90 PID 436 wrote to memory of 2628 436 216e1d916d8feede14e6a44c42770717.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe"C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exeC:\Users\Admin\AppData\Local\Temp\216e1d916d8feede14e6a44c42770717.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d74c94ea13644eeb880e177eff0fa56e
SHA17a6dfbc2114bda1d16746f346b5dd4685e972cb2
SHA256b179f2a93b3b577dfcdead15d52788ed591fcbdf20c36dc96e85c4302650448c
SHA5124325918c10204fe95871a95347cadfef24353606b2e53152f5f8d69c2d1a5277c4bd3d25743f3f3d17d950803f047360361f3820f40a5ebb1492225f8c7f5159