Analysis
-
max time kernel
148s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:37
Static task
static1
Behavioral task
behavioral1
Sample
26a1a8fa6e4a51485276ed2455bf5053.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26a1a8fa6e4a51485276ed2455bf5053.exe
Resource
win10v2004-20231215-en
General
-
Target
26a1a8fa6e4a51485276ed2455bf5053.exe
-
Size
84KB
-
MD5
26a1a8fa6e4a51485276ed2455bf5053
-
SHA1
9e1c8b1f9d9db295424f2db370b5404831454b82
-
SHA256
82fc487167a27ec33c3d61bf482624b60c6277f31736d31b27357e75f26b0fe1
-
SHA512
b1392c364ccea1bbb469fda009a2f00da293e5096d3b045f048fbe96bea6ce9a29fd3171195199c1d698349b0a2837d7d1fef5f5512801c0053f4eda7c251d50
-
SSDEEP
1536:c7nkJ7C//hwN3wgPdBXWXefW+FlzxaO6liM0rcC5FE07+eYUoQPI43:m+7vN3XWXD+Fl79rBP+e7oQA43
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3468 26a1a8fa6e4a51485276ed2455bf5053.exe -
Executes dropped EXE 1 IoCs
pid Process 3468 26a1a8fa6e4a51485276ed2455bf5053.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4784 26a1a8fa6e4a51485276ed2455bf5053.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4784 26a1a8fa6e4a51485276ed2455bf5053.exe 3468 26a1a8fa6e4a51485276ed2455bf5053.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3468 4784 26a1a8fa6e4a51485276ed2455bf5053.exe 96 PID 4784 wrote to memory of 3468 4784 26a1a8fa6e4a51485276ed2455bf5053.exe 96 PID 4784 wrote to memory of 3468 4784 26a1a8fa6e4a51485276ed2455bf5053.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe"C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exeC:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD57cc2becfdf004ce2ece205245c779c72
SHA14bb39ab31ee3b22e04b7f8b9edbead66678ef078
SHA2569e446f5b15874aebb09bcd53e943fca985ec3779e7d7655bef6e6e9dc151b221
SHA5123c6caf4ca2e584b9f9e1b8b2ce365e2e095e7149c398a56b621771a17ff5491d9f8d94aafcf4fc612511ccc188b5cf081cad45ec8f271acd12c6035091a5ca09