Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:34
Static task
static1
Behavioral task
behavioral1
Sample
24a4b75ea07b5938f69431266a3231c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24a4b75ea07b5938f69431266a3231c4.exe
Resource
win10v2004-20231215-en
General
-
Target
24a4b75ea07b5938f69431266a3231c4.exe
-
Size
84KB
-
MD5
24a4b75ea07b5938f69431266a3231c4
-
SHA1
3424b65c200cd6b94503bd9e549e6ba3834ba009
-
SHA256
24acf88b90ef33740265c252d0c7b364782e9612a626807c2c0c0b26fe8070fc
-
SHA512
14b6f9ee86ccbb9f3d59fba7ba98bd6c50d92dcf6e774613de3fe79dc7b1f80d0481de65b9ea84ca7d74c9ba7a8a2df8b6d477f8a826b718461b9132a3192eb7
-
SSDEEP
1536:jW7uk7MwJNF5CVzAu/+7CJ1Gmpx7kfNZ+gz0lvkgz5t3X05Hz0HI1Udw+XUn:K7ukH80S+7wvqNZwsSnXoWiUS+XUn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 24a4b75ea07b5938f69431266a3231c4.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 24a4b75ea07b5938f69431266a3231c4.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 24a4b75ea07b5938f69431266a3231c4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2720 24a4b75ea07b5938f69431266a3231c4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2720 24a4b75ea07b5938f69431266a3231c4.exe 2748 24a4b75ea07b5938f69431266a3231c4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2748 2720 24a4b75ea07b5938f69431266a3231c4.exe 29 PID 2720 wrote to memory of 2748 2720 24a4b75ea07b5938f69431266a3231c4.exe 29 PID 2720 wrote to memory of 2748 2720 24a4b75ea07b5938f69431266a3231c4.exe 29 PID 2720 wrote to memory of 2748 2720 24a4b75ea07b5938f69431266a3231c4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a4b75ea07b5938f69431266a3231c4.exe"C:\Users\Admin\AppData\Local\Temp\24a4b75ea07b5938f69431266a3231c4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\24a4b75ea07b5938f69431266a3231c4.exeC:\Users\Admin\AppData\Local\Temp\24a4b75ea07b5938f69431266a3231c4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD548de3d17b1c5446c5776774ef1254d69
SHA168e02c5db50ebcc175b1820eb0085d50aa243903
SHA256ce4d6d1cac50111ab27d5ae40d682d3617ca8f13c92819710775966a25e38879
SHA51283c42902de422b2d34543c1692c8d0b9bd3ce3003cb516228377668d5df3de646f22dda21c1e1e817b227558ad86538d68b87e72b0d0002c9d993fd4ee6db85b