Analysis
-
max time kernel
147s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:27
Behavioral task
behavioral1
Sample
28210ad5aa59246091be6cc5d2c2166c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28210ad5aa59246091be6cc5d2c2166c.exe
Resource
win10v2004-20231215-en
General
-
Target
28210ad5aa59246091be6cc5d2c2166c.exe
-
Size
2.7MB
-
MD5
28210ad5aa59246091be6cc5d2c2166c
-
SHA1
fdd19480aa94c61aed9266bee7a496a5a361d1cd
-
SHA256
240e12a81fb61443db4ed62782bbb912a2276eff3bb0fdfa6ea1175b53f9b53c
-
SHA512
f7343ce274da00f8e645f910475eea8281a471deaa29aa979ab1c54bf51946c1399bf161d7023a14f678dd224928f7aaccc8681db8b9361622a76a711778904a
-
SSDEEP
49152:5wb9MNbhVYAiN85o7lxINzelykXyzvz3037qPQtlDdgXF2jgFp:5w9MhsvINzwXWL03mQPDU2kFp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2440 28210ad5aa59246091be6cc5d2c2166c.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 28210ad5aa59246091be6cc5d2c2166c.exe -
resource yara_rule behavioral2/memory/968-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2440-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002322d-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 968 28210ad5aa59246091be6cc5d2c2166c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 968 28210ad5aa59246091be6cc5d2c2166c.exe 2440 28210ad5aa59246091be6cc5d2c2166c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 2440 968 28210ad5aa59246091be6cc5d2c2166c.exe 91 PID 968 wrote to memory of 2440 968 28210ad5aa59246091be6cc5d2c2166c.exe 91 PID 968 wrote to memory of 2440 968 28210ad5aa59246091be6cc5d2c2166c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\28210ad5aa59246091be6cc5d2c2166c.exe"C:\Users\Admin\AppData\Local\Temp\28210ad5aa59246091be6cc5d2c2166c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\28210ad5aa59246091be6cc5d2c2166c.exeC:\Users\Admin\AppData\Local\Temp\28210ad5aa59246091be6cc5d2c2166c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ac2dcaa1c18b919d269268b098bbe3dc
SHA1532d487b4f1900a8a89f1c2b548369f352a6919c
SHA256ea0d50a4d7d39077ea7deef3229e7cbf97d69ee3207530dcbf98b186aba258a1
SHA5127256ba8212f57e1fe885687ca00ba737557c29ad01a0480ae79743c7f2f1bdabbcdb723a28ff09fc8ec25d43bffc6de9b14d36e4ce9f8c90427a554ca6d5ea7f