Analysis

  • max time kernel
    148s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 03:37

General

  • Target

    26a1a8fa6e4a51485276ed2455bf5053.exe

  • Size

    84KB

  • MD5

    26a1a8fa6e4a51485276ed2455bf5053

  • SHA1

    9e1c8b1f9d9db295424f2db370b5404831454b82

  • SHA256

    82fc487167a27ec33c3d61bf482624b60c6277f31736d31b27357e75f26b0fe1

  • SHA512

    b1392c364ccea1bbb469fda009a2f00da293e5096d3b045f048fbe96bea6ce9a29fd3171195199c1d698349b0a2837d7d1fef5f5512801c0053f4eda7c251d50

  • SSDEEP

    1536:c7nkJ7C//hwN3wgPdBXWXefW+FlzxaO6liM0rcC5FE07+eYUoQPI43:m+7vN3XWXD+Fl79rBP+e7oQA43

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe
    "C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe
      C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\26a1a8fa6e4a51485276ed2455bf5053.exe

    Filesize

    84KB

    MD5

    7cc2becfdf004ce2ece205245c779c72

    SHA1

    4bb39ab31ee3b22e04b7f8b9edbead66678ef078

    SHA256

    9e446f5b15874aebb09bcd53e943fca985ec3779e7d7655bef6e6e9dc151b221

    SHA512

    3c6caf4ca2e584b9f9e1b8b2ce365e2e095e7149c398a56b621771a17ff5491d9f8d94aafcf4fc612511ccc188b5cf081cad45ec8f271acd12c6035091a5ca09

  • memory/3468-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3468-14-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/3468-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3468-23-0x0000000004DA0000-0x0000000004DBB000-memory.dmp

    Filesize

    108KB

  • memory/4784-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4784-1-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/4784-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4784-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB