Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:56
Static task
static1
Behavioral task
behavioral1
Sample
225c931c1d325ba754946aec1ddb5e8f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
225c931c1d325ba754946aec1ddb5e8f.exe
Resource
win10v2004-20231215-en
General
-
Target
225c931c1d325ba754946aec1ddb5e8f.exe
-
Size
82KB
-
MD5
225c931c1d325ba754946aec1ddb5e8f
-
SHA1
d224464300d60dbb8161a62f0c7db723230195c5
-
SHA256
ae30e442ddf58c39522083dd6c9e418937439bb7a4326fdc12bacfaf21133989
-
SHA512
d5e3d285f609b5c46b361531f241de7c2e3914ff7fc38999d3515555ccab84419469b36842972ec0a98ff5fd16fc0ee22a70ccae844474190cb6b7271631ee94
-
SSDEEP
1536:wiSKgipx39Ac6peWM3KoVQdoWR0pWof2o0kRe:wuDaen3FVQdoWR8Wof2o0kRe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 225c931c1d325ba754946aec1ddb5e8f.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 225c931c1d325ba754946aec1ddb5e8f.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 225c931c1d325ba754946aec1ddb5e8f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 225c931c1d325ba754946aec1ddb5e8f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2888 225c931c1d325ba754946aec1ddb5e8f.exe 2040 225c931c1d325ba754946aec1ddb5e8f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2040 2888 225c931c1d325ba754946aec1ddb5e8f.exe 14 PID 2888 wrote to memory of 2040 2888 225c931c1d325ba754946aec1ddb5e8f.exe 14 PID 2888 wrote to memory of 2040 2888 225c931c1d325ba754946aec1ddb5e8f.exe 14 PID 2888 wrote to memory of 2040 2888 225c931c1d325ba754946aec1ddb5e8f.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\225c931c1d325ba754946aec1ddb5e8f.exeC:\Users\Admin\AppData\Local\Temp\225c931c1d325ba754946aec1ddb5e8f.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2040
-
C:\Users\Admin\AppData\Local\Temp\225c931c1d325ba754946aec1ddb5e8f.exe"C:\Users\Admin\AppData\Local\Temp\225c931c1d325ba754946aec1ddb5e8f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5415175e512830f27dd7f4371a65864f3
SHA1de25d9e122b031f0af5829b1264e935907db6faa
SHA256b11a53d9dbecb127ff8c756195ef446dc3d5c845d2a857201ad88efbf2c79216
SHA512e4e0df7c5245b0e467e6d16e3b7fc63a28da0162575e3a8b5525b824eb746397a2207daef2359c3ca09993e072ae7ca04db7e9d441b92ac8d2937ce786358248