Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 03:38

General

  • Target

    26a3d73af7c1e87447d22d5e8433f927.exe

  • Size

    82KB

  • MD5

    26a3d73af7c1e87447d22d5e8433f927

  • SHA1

    544b1366a4970a9905625de22a9a1c5059de0270

  • SHA256

    a964fe41e4ea7328bdbdf78399d76b36e48f9e1714c81240207750f4fbceb15f

  • SHA512

    a4a29d445cc36ceda9668333ea0159ed7e0db8eabfc245a8ce647d930e768c48b0e8bd33e5a0b3967241383283750b18104b40a3761afa99d141de3c95eca8f5

  • SSDEEP

    1536:uGCqGwGQfUiFVoYAZRIXoa/iLa+bjFh8plaAmPwIrOcN:bCG361IXoama+bcpLmPw0OcN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe
    "C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe
      C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe

    Filesize

    64KB

    MD5

    e953df800b5eea824131e12d3a21766b

    SHA1

    f296b6748e3756d28419c0697d6328eee9368910

    SHA256

    c388cdec0763bbd90fdaff4602eb853a0dfd16da90e12eabe9a9306cb42738d7

    SHA512

    1e9539862ad75b2cda4b63c15ccd121d8fece2223038598ef5e744e67466fb2b44028eca0889604112dba20d9413a41e37bea67cb10ffc7458dd7cdb2340eb69

  • memory/2700-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2700-25-0x00000000015E0000-0x00000000015FB000-memory.dmp

    Filesize

    108KB

  • memory/2700-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2700-14-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/4076-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4076-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/4076-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4076-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB