Analysis
-
max time kernel
4s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:38
Behavioral task
behavioral1
Sample
24c95912e9c0cf7714f03e8e33ee43b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24c95912e9c0cf7714f03e8e33ee43b9.exe
Resource
win10v2004-20231222-en
General
-
Target
24c95912e9c0cf7714f03e8e33ee43b9.exe
-
Size
10.2MB
-
MD5
24c95912e9c0cf7714f03e8e33ee43b9
-
SHA1
e76f8dbaabd868500c206408f14f4c2b47d1c332
-
SHA256
f579a519615460e8cce1555bac82c1489de87778a72c4b9fe5f5816234f21566
-
SHA512
73bf38f8eb8d88e445f7e541be54af6f36969f004fdc4b512ff2b04754ef1fb6e9ec125c8ce78662957836e85960b029263fb0b7a6fa35ab9548560c8e0dfe4a
-
SSDEEP
98304:piT1IyKVaWhh30g2yOEjjs9/g39uAESR3JWMeWl6830g2yOEjjs9/g3:piT1lgaWoZUju/FShJWHtZUju/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3892 24c95912e9c0cf7714f03e8e33ee43b9.exe -
Executes dropped EXE 1 IoCs
pid Process 3892 24c95912e9c0cf7714f03e8e33ee43b9.exe -
resource yara_rule behavioral2/memory/3684-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/memory/3892-15-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/files/0x00080000000231f0-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3684 24c95912e9c0cf7714f03e8e33ee43b9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3684 24c95912e9c0cf7714f03e8e33ee43b9.exe 3892 24c95912e9c0cf7714f03e8e33ee43b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3892 3684 24c95912e9c0cf7714f03e8e33ee43b9.exe 23 PID 3684 wrote to memory of 3892 3684 24c95912e9c0cf7714f03e8e33ee43b9.exe 23 PID 3684 wrote to memory of 3892 3684 24c95912e9c0cf7714f03e8e33ee43b9.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c95912e9c0cf7714f03e8e33ee43b9.exe"C:\Users\Admin\AppData\Local\Temp\24c95912e9c0cf7714f03e8e33ee43b9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\24c95912e9c0cf7714f03e8e33ee43b9.exeC:\Users\Admin\AppData\Local\Temp\24c95912e9c0cf7714f03e8e33ee43b9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD564a2e566a8f340f7fce11063a750e11e
SHA13e289f6de9d9e13ebad31c99947dd74a8b216fb1
SHA2562c28f91835592a060a1214b95c4b19e97944a9a62f06e85e5406d778b0e96a39
SHA512226f58476116191983f5c2a07b17c8392af03d508bd856f10aefb7b8be8a49bfcd8301d9c7f887538a4036cf7e7fe26714fca58a492a662a727c1b188be6155a