Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
26a3d73af7c1e87447d22d5e8433f927.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26a3d73af7c1e87447d22d5e8433f927.exe
Resource
win10v2004-20231215-en
General
-
Target
26a3d73af7c1e87447d22d5e8433f927.exe
-
Size
82KB
-
MD5
26a3d73af7c1e87447d22d5e8433f927
-
SHA1
544b1366a4970a9905625de22a9a1c5059de0270
-
SHA256
a964fe41e4ea7328bdbdf78399d76b36e48f9e1714c81240207750f4fbceb15f
-
SHA512
a4a29d445cc36ceda9668333ea0159ed7e0db8eabfc245a8ce647d930e768c48b0e8bd33e5a0b3967241383283750b18104b40a3761afa99d141de3c95eca8f5
-
SSDEEP
1536:uGCqGwGQfUiFVoYAZRIXoa/iLa+bjFh8plaAmPwIrOcN:bCG361IXoama+bcpLmPw0OcN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 26a3d73af7c1e87447d22d5e8433f927.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 26a3d73af7c1e87447d22d5e8433f927.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4076 26a3d73af7c1e87447d22d5e8433f927.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4076 26a3d73af7c1e87447d22d5e8433f927.exe 2700 26a3d73af7c1e87447d22d5e8433f927.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2700 4076 26a3d73af7c1e87447d22d5e8433f927.exe 21 PID 4076 wrote to memory of 2700 4076 26a3d73af7c1e87447d22d5e8433f927.exe 21 PID 4076 wrote to memory of 2700 4076 26a3d73af7c1e87447d22d5e8433f927.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe"C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exeC:\Users\Admin\AppData\Local\Temp\26a3d73af7c1e87447d22d5e8433f927.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e953df800b5eea824131e12d3a21766b
SHA1f296b6748e3756d28419c0697d6328eee9368910
SHA256c388cdec0763bbd90fdaff4602eb853a0dfd16da90e12eabe9a9306cb42738d7
SHA5121e9539862ad75b2cda4b63c15ccd121d8fece2223038598ef5e744e67466fb2b44028eca0889604112dba20d9413a41e37bea67cb10ffc7458dd7cdb2340eb69