Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:26
Static task
static1
Behavioral task
behavioral1
Sample
281ddee96eac89f5ef71a61effe1b288.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
281ddee96eac89f5ef71a61effe1b288.exe
Resource
win10v2004-20231215-en
General
-
Target
281ddee96eac89f5ef71a61effe1b288.exe
-
Size
82KB
-
MD5
281ddee96eac89f5ef71a61effe1b288
-
SHA1
474fe260a92605d438ea0182cb5dde0581cac17c
-
SHA256
439db4a116ccf8e4335e2a9f73bc4216b466466c36c8b60bbe4fc37c0585eda7
-
SHA512
50b6487e2e3c8758fe86a74bbd36d4853db8dd16ebfff6bbc99a60219ab69a551021e597a3032b77d22ae4ed24c6d6e04378944d6b1ac7b54c50714de047cc1a
-
SSDEEP
1536:H761WbbT8SKjKS/0yHl1CyHIByP68Xrk5r0RsvYLwPaOxslDmVS4/Qxq:m1Wbn8SKjKS/0y/IByCQrGrQgJnsQT/R
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 281ddee96eac89f5ef71a61effe1b288.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 281ddee96eac89f5ef71a61effe1b288.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 281ddee96eac89f5ef71a61effe1b288.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2156 281ddee96eac89f5ef71a61effe1b288.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 281ddee96eac89f5ef71a61effe1b288.exe 2300 281ddee96eac89f5ef71a61effe1b288.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2300 2156 281ddee96eac89f5ef71a61effe1b288.exe 16 PID 2156 wrote to memory of 2300 2156 281ddee96eac89f5ef71a61effe1b288.exe 16 PID 2156 wrote to memory of 2300 2156 281ddee96eac89f5ef71a61effe1b288.exe 16 PID 2156 wrote to memory of 2300 2156 281ddee96eac89f5ef71a61effe1b288.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe"C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exeC:\Users\Admin\AppData\Local\Temp\281ddee96eac89f5ef71a61effe1b288.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55735271d56e5ac2dcf2aee392ee1b96c
SHA11b43d5b4c45ec2a6c6253375c957fc3f841d37dc
SHA25698f1af30494d506ffa4c351d0d5b24f4205c7b7eb7a579642194eb4f3f7b7e97
SHA512256fd3fa4b503fe9d35c75a2c3cae1de21e82a6482c1604ff0be6347dfb10a039b1e87ce7f55e435515bafe9a04895a2e1752a30ed72a61db5873f10375fd409