Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:31
Static task
static1
Behavioral task
behavioral1
Sample
248f83cf374d56d59cfdba8691e2c9ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
248f83cf374d56d59cfdba8691e2c9ae.exe
Resource
win10v2004-20231215-en
General
-
Target
248f83cf374d56d59cfdba8691e2c9ae.exe
-
Size
84KB
-
MD5
248f83cf374d56d59cfdba8691e2c9ae
-
SHA1
0f7e173da867f2c97fb35a81314e6a5982a5b477
-
SHA256
529d113d4b046ca0f9cfb851d688d5645211ac037a87c454f0eb9f29e355d241
-
SHA512
9df50af46048757023ebc8291c562cc32bdb6ac58246e5783318e62f93f5411e06a10e6f9cdf3294429068083e6b20c7f480c8828282ccfd78a4ca337d06b114
-
SSDEEP
1536:iNk9tlFNzm2X3D5/I+jzLAmv6zM6HpgXMgkR7A6bBaqf+poKuLXgL9q:igtc2HF/PPAjH66kKN0ewRq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 248f83cf374d56d59cfdba8691e2c9ae.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 248f83cf374d56d59cfdba8691e2c9ae.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 248f83cf374d56d59cfdba8691e2c9ae.exe 2216 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2216 1968 248f83cf374d56d59cfdba8691e2c9ae.exe 29 PID 1968 wrote to memory of 2216 1968 248f83cf374d56d59cfdba8691e2c9ae.exe 29 PID 1968 wrote to memory of 2216 1968 248f83cf374d56d59cfdba8691e2c9ae.exe 29 PID 1968 wrote to memory of 2216 1968 248f83cf374d56d59cfdba8691e2c9ae.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe"C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exeC:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55ac0189eaf4c9a63fbab251fc629768e
SHA114f5ad85878127e6cbedb43de7383f22ad53baa4
SHA256347f4d46b0824393824b6613fcd0dee90ea7ca09e67a9060abb25d1d94c802ed
SHA512c787e4f43d98c0f2ecd0d4dd165a8c78333d5e4a5a9870a9f8c933b3e0a99356e42e1170b78a32b3a183c3b394eecfe05aae1dcdf3b9a22c166e8ecefc0eb090