Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:55
Behavioral task
behavioral1
Sample
2388ef6542cb8646bddb14ef355a6ee3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2388ef6542cb8646bddb14ef355a6ee3.exe
Resource
win10v2004-20231215-en
General
-
Target
2388ef6542cb8646bddb14ef355a6ee3.exe
-
Size
56KB
-
MD5
2388ef6542cb8646bddb14ef355a6ee3
-
SHA1
d11153d61dfdd41453b9329397a6ebdc93ea43d4
-
SHA256
8a77c8eb7a429060d5abdc9082adadc71a3a3b24fda892d9188d95610776afb1
-
SHA512
b2598683920ed4526e1f6f4fde8d5578cac20a996a87db37738dd0f57d19d3bf41fea7b1a05653ee337ee4dd5b7474ae59d791040a7b158d149b15bf262b1c7b
-
SSDEEP
1536:In/F5zEmHs9a6h6B2BlaD9ApWGSx2jSUjmiG0sy8G0aqM:I//BHs9jg4WijjJV8r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4664 2388ef6542cb8646bddb14ef355a6ee3.exe -
Executes dropped EXE 1 IoCs
pid Process 4664 2388ef6542cb8646bddb14ef355a6ee3.exe -
resource yara_rule behavioral2/memory/4588-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000e00000002314b-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4588 2388ef6542cb8646bddb14ef355a6ee3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4588 2388ef6542cb8646bddb14ef355a6ee3.exe 4664 2388ef6542cb8646bddb14ef355a6ee3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4664 4588 2388ef6542cb8646bddb14ef355a6ee3.exe 21 PID 4588 wrote to memory of 4664 4588 2388ef6542cb8646bddb14ef355a6ee3.exe 21 PID 4588 wrote to memory of 4664 4588 2388ef6542cb8646bddb14ef355a6ee3.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\2388ef6542cb8646bddb14ef355a6ee3.exe"C:\Users\Admin\AppData\Local\Temp\2388ef6542cb8646bddb14ef355a6ee3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\2388ef6542cb8646bddb14ef355a6ee3.exeC:\Users\Admin\AppData\Local\Temp\2388ef6542cb8646bddb14ef355a6ee3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD541bc663b8d6d163494786bc2407b2a4c
SHA16ac69a5e946d0ae2458318956714b3fe0c097e20
SHA25685dfbd489a626f89ebebb84218cd9ebf23fe24f99cc940baf0cf1573d4b6ea9f
SHA512e7e953b43261fbcadb5b37db014e9a5c83e241b9e899f0646f980e66598445448fbe68a1bf507a9e3f9f9c48cc78c19e9ca7660084acb17876a545ce5ce3259c