Analysis
-
max time kernel
135s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:35
Behavioral task
behavioral1
Sample
28673dbf0f859337332cfd4aae2bff84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28673dbf0f859337332cfd4aae2bff84.exe
Resource
win10v2004-20231215-en
General
-
Target
28673dbf0f859337332cfd4aae2bff84.exe
-
Size
2.7MB
-
MD5
28673dbf0f859337332cfd4aae2bff84
-
SHA1
30ce94d491027cda8035b74be7dce2e0c73c0d2b
-
SHA256
9b8aa800a19a9b8846af7ed9061922ac2c3c3c44060f7be0d8e365431e24a373
-
SHA512
d063fef80a1cbe35af705a273d12829d9a576e18a1fffca58edf60ebff96be7bb5aefcb74009f35354f4b8f12b9fa0c8e7fb2d721d40884675f56b6339905def
-
SSDEEP
49152:dNv5kusm5S1sEqgHKZtUnTzKyHYXhggPFDt5Lb9BknT/:dNwoS1sfgHK/svE/tx5Lb9Or
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 920 28673dbf0f859337332cfd4aae2bff84.exe -
Executes dropped EXE 1 IoCs
pid Process 920 28673dbf0f859337332cfd4aae2bff84.exe -
resource yara_rule behavioral2/memory/4616-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e982-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 28673dbf0f859337332cfd4aae2bff84.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4616 28673dbf0f859337332cfd4aae2bff84.exe 920 28673dbf0f859337332cfd4aae2bff84.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 920 4616 28673dbf0f859337332cfd4aae2bff84.exe 16 PID 4616 wrote to memory of 920 4616 28673dbf0f859337332cfd4aae2bff84.exe 16 PID 4616 wrote to memory of 920 4616 28673dbf0f859337332cfd4aae2bff84.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\28673dbf0f859337332cfd4aae2bff84.exe"C:\Users\Admin\AppData\Local\Temp\28673dbf0f859337332cfd4aae2bff84.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\28673dbf0f859337332cfd4aae2bff84.exeC:\Users\Admin\AppData\Local\Temp\28673dbf0f859337332cfd4aae2bff84.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD529ae7f72ab36276934af1e3838c17024
SHA13af3831c9a06f415e65300be2ebaa82b2233e117
SHA2566f4bc7a60a19be763df55e69b1cd5d609bcf48dc90f9a9963d1c344b5599d948
SHA512d92c08bb400344c5eb3d5c746558475e45e37643e5b22b5733bd2c5c2bec19d73f8fb01319c168e81f44fc19f2cdaf066f988657cc031f12cc9441ade41bfbdf