Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
238644167c92f9091a05dfcf663b4ce6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
238644167c92f9091a05dfcf663b4ce6.exe
Resource
win10v2004-20231222-en
General
-
Target
238644167c92f9091a05dfcf663b4ce6.exe
-
Size
82KB
-
MD5
238644167c92f9091a05dfcf663b4ce6
-
SHA1
820bd179901d75a4f568f55908e038b372d20f49
-
SHA256
bedf289bd3dccaa1ca59044d4d9a498b1a3dfea086d090e8f0623046db9052e4
-
SHA512
2a2a5691176d10e98cd997b57e9cc53cc0146893b6e6bd53c194dc0c0460f858c838bceb48a700b2136ddf998f26bb703728d57aae6735b15035134f0bbad7a2
-
SSDEEP
1536:kLB2ZBYVoHOJln11qzGKr9vunJsKY80K/Vsg9mEus69nmsxQPbVqa6E:kLoZiVoHOj1k5r9vaJsJSVlus62D8TE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 238644167c92f9091a05dfcf663b4ce6.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 238644167c92f9091a05dfcf663b4ce6.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 238644167c92f9091a05dfcf663b4ce6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2180 238644167c92f9091a05dfcf663b4ce6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2180 238644167c92f9091a05dfcf663b4ce6.exe 2908 238644167c92f9091a05dfcf663b4ce6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2908 2180 238644167c92f9091a05dfcf663b4ce6.exe 29 PID 2180 wrote to memory of 2908 2180 238644167c92f9091a05dfcf663b4ce6.exe 29 PID 2180 wrote to memory of 2908 2180 238644167c92f9091a05dfcf663b4ce6.exe 29 PID 2180 wrote to memory of 2908 2180 238644167c92f9091a05dfcf663b4ce6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\238644167c92f9091a05dfcf663b4ce6.exe"C:\Users\Admin\AppData\Local\Temp\238644167c92f9091a05dfcf663b4ce6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\238644167c92f9091a05dfcf663b4ce6.exeC:\Users\Admin\AppData\Local\Temp\238644167c92f9091a05dfcf663b4ce6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50745d66c3050d62b4ce1c228f0d79c0f
SHA1a1797a1dc912f731d351dfa13726cce33185ec85
SHA25676960e01ff1e92455d1b5b97e11a802f3581822eb82e986b189b3b0e9706299b
SHA5126a4ad474c330ff9b289b10bda7417643321761d57c08fcc1cd5d445d544e470ca9ad00c19b8a18decd8296255587c01fa7c5bc6db204aa95ea712e848f8c53e4